General

  • Target

    00SI886_SO_0169256IN_20210818_000.js

  • Size

    31KB

  • Sample

    210830-cd38szk7d2

  • MD5

    786cd57e65ffb85f2e19b3d2ef3dc0bf

  • SHA1

    e36e41a8bb11ec29f90e0b3c643e2707d2a2f255

  • SHA256

    68921406e9b3c27e573cbf28f5d12a5b46cb40501384feaf13e4e3f753246d2c

  • SHA512

    45d85f01d0b2b2f8bb13e886ec8015c0f8d906b9041910ad94c2be2de4557c312f36cf018ccf37bb6fa362b1a6a49da674a08687691e78e78855206cb6cdcb99

Malware Config

Targets

    • Target

      00SI886_SO_0169256IN_20210818_000.js

    • Size

      31KB

    • MD5

      786cd57e65ffb85f2e19b3d2ef3dc0bf

    • SHA1

      e36e41a8bb11ec29f90e0b3c643e2707d2a2f255

    • SHA256

      68921406e9b3c27e573cbf28f5d12a5b46cb40501384feaf13e4e3f753246d2c

    • SHA512

      45d85f01d0b2b2f8bb13e886ec8015c0f8d906b9041910ad94c2be2de4557c312f36cf018ccf37bb6fa362b1a6a49da674a08687691e78e78855206cb6cdcb99

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks