General

  • Target

    Invoice-2.js

  • Size

    32KB

  • Sample

    210830-2jb4sxgk16

  • MD5

    23d1f183e50e7ea2393fa5eded265813

  • SHA1

    a85f64b11fe641fd18bb4b79f2779b11dd4c0869

  • SHA256

    47fd8e31ecf0c8243056163d6e17962156875c680d534756f4155e478526d2bb

  • SHA512

    740fd98898e225fe70f107c21eab6867436054e152e58828be39f0de022fc670150add5b6034a3bae3b91af91dacbfb230d47732c4b4fb7bfefee8a0175fef43

Malware Config

Targets

    • Target

      Invoice-2.js

    • Size

      32KB

    • MD5

      23d1f183e50e7ea2393fa5eded265813

    • SHA1

      a85f64b11fe641fd18bb4b79f2779b11dd4c0869

    • SHA256

      47fd8e31ecf0c8243056163d6e17962156875c680d534756f4155e478526d2bb

    • SHA512

      740fd98898e225fe70f107c21eab6867436054e152e58828be39f0de022fc670150add5b6034a3bae3b91af91dacbfb230d47732c4b4fb7bfefee8a0175fef43

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks