General

  • Target

    Company Profile Shelton 3.5-pdf.js

  • Size

    19KB

  • Sample

    210803-xhs3q5qsss

  • MD5

    136475f8c1a1c7f23d87ea255926df15

  • SHA1

    a2f0c5d389116df32e96c5e03210c370ea04da09

  • SHA256

    ef941e9a12dd57020e8c110e4978fb953b3d41f482f650184980318676fd0408

  • SHA512

    577ea90c902e95dd8ce1bf8227fad2439023d52733c57ccf3d1fe20e21c19b14529f1e23e75ef756b28c0c83d03c1a0a0e09ab5d04208a019647c15a2f5b070e

Malware Config

Targets

    • Target

      Company Profile Shelton 3.5-pdf.js

    • Size

      19KB

    • MD5

      136475f8c1a1c7f23d87ea255926df15

    • SHA1

      a2f0c5d389116df32e96c5e03210c370ea04da09

    • SHA256

      ef941e9a12dd57020e8c110e4978fb953b3d41f482f650184980318676fd0408

    • SHA512

      577ea90c902e95dd8ce1bf8227fad2439023d52733c57ccf3d1fe20e21c19b14529f1e23e75ef756b28c0c83d03c1a0a0e09ab5d04208a019647c15a2f5b070e

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks