General

  • Target

    SOLICITUD_99768674________.pdf.js

  • Size

    207KB

  • Sample

    210902-1es2zz9r56

  • MD5

    607e7ae85b834c95db9a85d479751580

  • SHA1

    185d69ebb99a415f47c83936c3a4ae3da12f7aa6

  • SHA256

    9ef3d03530f8deac1764f12fe8260303fe8a5838e2858999674bf08cf90369e9

  • SHA512

    65c5b4c95a5fe4ca6470a5abd6ef4de2f77fc2ed0638f914227190939d92378109216ea772ebf685858550c9d10586a6660642ae30ea26d3c8833e2ea77e2825

Malware Config

Targets

    • Target

      SOLICITUD_99768674________.pdf.js

    • Size

      207KB

    • MD5

      607e7ae85b834c95db9a85d479751580

    • SHA1

      185d69ebb99a415f47c83936c3a4ae3da12f7aa6

    • SHA256

      9ef3d03530f8deac1764f12fe8260303fe8a5838e2858999674bf08cf90369e9

    • SHA512

      65c5b4c95a5fe4ca6470a5abd6ef4de2f77fc2ed0638f914227190939d92378109216ea772ebf685858550c9d10586a6660642ae30ea26d3c8833e2ea77e2825

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks