General

  • Target

    uVIuZhBZxlNEW COPY DOCSCANNED ORDERAUGIMG6210.js

  • Size

    1.1MB

  • Sample

    210902-jkpaqawhla

  • MD5

    53d9dc9fa9cc34f33fe03b7c5f5fce6b

  • SHA1

    8d906ed4bfd58c0220765721298ce2e75256b568

  • SHA256

    2501e01c4f196967e005c2969f1d692ca8adcb24a23c5d6fb13f9a0b71f2d8c8

  • SHA512

    baa55aa8cad643bf63ef21b6413d4bd3fb92c702588f95b650187b06189ae2a191945a777856662fd5d0801115700e4c7a6de3143b1e03a5bb666040bfdb1ca7

Malware Config

Targets

    • Target

      uVIuZhBZxlNEW COPY DOCSCANNED ORDERAUGIMG6210.js

    • Size

      1.1MB

    • MD5

      53d9dc9fa9cc34f33fe03b7c5f5fce6b

    • SHA1

      8d906ed4bfd58c0220765721298ce2e75256b568

    • SHA256

      2501e01c4f196967e005c2969f1d692ca8adcb24a23c5d6fb13f9a0b71f2d8c8

    • SHA512

      baa55aa8cad643bf63ef21b6413d4bd3fb92c702588f95b650187b06189ae2a191945a777856662fd5d0801115700e4c7a6de3143b1e03a5bb666040bfdb1ca7

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks