General

  • Target

    Invoice_#02.js

  • Size

    9KB

  • Sample

    210728-p2yydq9e9a

  • MD5

    14bf111a8393a7293bcedcb4836c9be0

  • SHA1

    ba000e395f99d5be511c4212dc80a4609d342a4b

  • SHA256

    510b335ce718d50da78a27b1750e2af1b18994b10e550c78c61a4491976eb974

  • SHA512

    60180d69e6db7711fa934a4e81aa69445c14a171220567f1a028673a45ee450eea3f1639a83dbc3ce00f87cdb06e713a460631f3eda308f74c85cdf8e5f23cac

Malware Config

Targets

    • Target

      Invoice_#02.js

    • Size

      9KB

    • MD5

      14bf111a8393a7293bcedcb4836c9be0

    • SHA1

      ba000e395f99d5be511c4212dc80a4609d342a4b

    • SHA256

      510b335ce718d50da78a27b1750e2af1b18994b10e550c78c61a4491976eb974

    • SHA512

      60180d69e6db7711fa934a4e81aa69445c14a171220567f1a028673a45ee450eea3f1639a83dbc3ce00f87cdb06e713a460631f3eda308f74c85cdf8e5f23cac

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks