General

  • Target

    20200820-28094_75-50.js

  • Size

    332KB

  • Sample

    210823-aejdlbl2ss

  • MD5

    137a79bb32e10321f3803bb74e98fd93

  • SHA1

    6d6f6567f58794b362f7c6837b8a082e0a9aea4d

  • SHA256

    a9b5cf89510cfcc9b8ab7e311395540e1810f69f47ebf735134a04b376960ad0

  • SHA512

    6594af60eba8b6645bdc77f0f1fb69ba4f71b8514e749641e08098f0249d3527bd9c62db00abf88b821179f8d9cf829dd556cfc64afdba1b8a7890d406c669b7

Malware Config

Targets

    • Target

      20200820-28094_75-50.js

    • Size

      332KB

    • MD5

      137a79bb32e10321f3803bb74e98fd93

    • SHA1

      6d6f6567f58794b362f7c6837b8a082e0a9aea4d

    • SHA256

      a9b5cf89510cfcc9b8ab7e311395540e1810f69f47ebf735134a04b376960ad0

    • SHA512

      6594af60eba8b6645bdc77f0f1fb69ba4f71b8514e749641e08098f0249d3527bd9c62db00abf88b821179f8d9cf829dd556cfc64afdba1b8a7890d406c669b7

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks