General

  • Target

    MT103 PAYMENT_ANCHORS_4263782872.pdf.js

  • Size

    205KB

  • Sample

    210905-mjt29shef5

  • MD5

    f924ea1d9a529af64d57c5daa6f55bab

  • SHA1

    e39ec476abb7acce4e713f15fb121ceed72b12c2

  • SHA256

    872339e661e1a90638d6981b8b09d56cccebdfdfad0fabb2c5100f4c05bccce7

  • SHA512

    3d59266b9bbfa01dd4c694faa42f53d8c87eae2698cfdfdd941eaa6cfaeeb2383c0fdf4deb32f4c0ecaf8ffa671737ee7d6acbd186ef8ee3c0ef85e79719140c

Malware Config

Targets

    • Target

      MT103 PAYMENT_ANCHORS_4263782872.pdf.js

    • Size

      205KB

    • MD5

      f924ea1d9a529af64d57c5daa6f55bab

    • SHA1

      e39ec476abb7acce4e713f15fb121ceed72b12c2

    • SHA256

      872339e661e1a90638d6981b8b09d56cccebdfdfad0fabb2c5100f4c05bccce7

    • SHA512

      3d59266b9bbfa01dd4c694faa42f53d8c87eae2698cfdfdd941eaa6cfaeeb2383c0fdf4deb32f4c0ecaf8ffa671737ee7d6acbd186ef8ee3c0ef85e79719140c

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks