General

  • Target

    PO #008661.js

  • Size

    3KB

  • Sample

    210705-47cwydnbps

  • MD5

    c9f67a83623894b769cda3123dd64db7

  • SHA1

    7b469db6a066919c8b62e249e92b26dfdcf22fd5

  • SHA256

    46b304cdebbfac4fc60dbb3a885f6442bf1ec6e7a15a23f10de75f4febe2cecc

  • SHA512

    9ebd912945b15e2a42d765fa811963af28598a61ee94e5dcd84368733801055a079f02f96960a2079d451878406e394904bb27b75eda41180ad7dc45ef57c3a8

Malware Config

Targets

    • Target

      PO #008661.js

    • Size

      3KB

    • MD5

      c9f67a83623894b769cda3123dd64db7

    • SHA1

      7b469db6a066919c8b62e249e92b26dfdcf22fd5

    • SHA256

      46b304cdebbfac4fc60dbb3a885f6442bf1ec6e7a15a23f10de75f4febe2cecc

    • SHA512

      9ebd912945b15e2a42d765fa811963af28598a61ee94e5dcd84368733801055a079f02f96960a2079d451878406e394904bb27b75eda41180ad7dc45ef57c3a8

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks