General

  • Target

    Invoice5697484.js

  • Size

    200KB

  • Sample

    210829-lqyk6476sj

  • MD5

    f8f5bed73850632ff591989c5b88f9ee

  • SHA1

    ce9066586bf44f0e77243ebdd6d2ce109cf7bd7a

  • SHA256

    ce199d986d0d04279edd245f3a0fe115c7c680a214d73feed8a8451b7b7feb94

  • SHA512

    72be43f9ce219a02fc9ee7395867e91f9b175fffa3cf6c69800d5a8ab3e7617bf22e56fa5d1506bfc5b81d303f86c4be278debaad472e7a7bd41e10a0b31a9a9

Malware Config

Targets

    • Target

      Invoice5697484.js

    • Size

      200KB

    • MD5

      f8f5bed73850632ff591989c5b88f9ee

    • SHA1

      ce9066586bf44f0e77243ebdd6d2ce109cf7bd7a

    • SHA256

      ce199d986d0d04279edd245f3a0fe115c7c680a214d73feed8a8451b7b7feb94

    • SHA512

      72be43f9ce219a02fc9ee7395867e91f9b175fffa3cf6c69800d5a8ab3e7617bf22e56fa5d1506bfc5b81d303f86c4be278debaad472e7a7bd41e10a0b31a9a9

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks