General

  • Target

    1ZXONMSABNA.js

  • Size

    9KB

  • Sample

    210716-ked2t1yqln

  • MD5

    ef86be6b2cc4b30e2759e38482d86008

  • SHA1

    d242dbd08203cdd94b7501fd3f62c92102b517ac

  • SHA256

    7eeb160cbe8bb7a5bbbf49c35c1b8ce4a10fdf518a4a28c494fdcf033841cbc1

  • SHA512

    b0ac5813f5345bbd44e042fed252ab5ef3d0bf2f5bb3c52469a978f771ef4c721237c43d3971bad15fc97a904405aacacc43ade1bc136a5dc3d244334b36e2ad

Malware Config

Targets

    • Target

      1ZXONMSABNA.js

    • Size

      9KB

    • MD5

      ef86be6b2cc4b30e2759e38482d86008

    • SHA1

      d242dbd08203cdd94b7501fd3f62c92102b517ac

    • SHA256

      7eeb160cbe8bb7a5bbbf49c35c1b8ce4a10fdf518a4a28c494fdcf033841cbc1

    • SHA512

      b0ac5813f5345bbd44e042fed252ab5ef3d0bf2f5bb3c52469a978f771ef4c721237c43d3971bad15fc97a904405aacacc43ade1bc136a5dc3d244334b36e2ad

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks