General

  • Target

    d5fe40e5_GW0BFNhBvP

  • Size

    205KB

  • Sample

    210907-fqe4csbga4

  • MD5

    d5fe40e5e35ebbc1a60c54672f775325

  • SHA1

    9b01278c620351932e98e95db9881f18652f7e67

  • SHA256

    a40e1a0e0a1e68051cefc29955d92d99efa3d24a8d70052de8aa9e4ab08da32b

  • SHA512

    2ade53d5a1d303328af40acf3f1d231fc54a8b3eb0d1e934094a7b7c63e5035c679e7ce89465e0ea4ea796e7f5f991c1da760cb64ad4b15b8d9130272e6d617c

Malware Config

Targets

    • Target

      d5fe40e5_GW0BFNhBvP

    • Size

      205KB

    • MD5

      d5fe40e5e35ebbc1a60c54672f775325

    • SHA1

      9b01278c620351932e98e95db9881f18652f7e67

    • SHA256

      a40e1a0e0a1e68051cefc29955d92d99efa3d24a8d70052de8aa9e4ab08da32b

    • SHA512

      2ade53d5a1d303328af40acf3f1d231fc54a8b3eb0d1e934094a7b7c63e5035c679e7ce89465e0ea4ea796e7f5f991c1da760cb64ad4b15b8d9130272e6d617c

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks