General

  • Target

    Proof of payment.js

  • Size

    23KB

  • Sample

    210811-ttkzqz46h2

  • MD5

    8fdc868b35a760294af50f21f3a36337

  • SHA1

    644818ad3b6d733c34ac2f5e11741bb72c1498f7

  • SHA256

    63426a314efd8585245ae432e2041dbde96bf69b2dc39dddeea63271bef027c2

  • SHA512

    3e2cbd90575b177ab74e0990aa273db548f98b757bf0547445c51d945c52e9bf72ff96a556967b5d09a8dfae500f1d5fe1a6a4fd4a0be5ae180576f989cf772c

Score
10/10

Malware Config

Targets

    • Target

      Proof of payment.js

    • Size

      23KB

    • MD5

      8fdc868b35a760294af50f21f3a36337

    • SHA1

      644818ad3b6d733c34ac2f5e11741bb72c1498f7

    • SHA256

      63426a314efd8585245ae432e2041dbde96bf69b2dc39dddeea63271bef027c2

    • SHA512

      3e2cbd90575b177ab74e0990aa273db548f98b757bf0547445c51d945c52e9bf72ff96a556967b5d09a8dfae500f1d5fe1a6a4fd4a0be5ae180576f989cf772c

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks