General

  • Target

    03f42ed6_uphdOxj4_3

  • Size

    207KB

  • Sample

    210910-fnzd8acdbj

  • MD5

    03f42ed6e4f5e621434500ce13567023

  • SHA1

    447e833b37da6f032ff2933c035346b508db92fd

  • SHA256

    9ae44da8053f269d4adfc30da8f62d1362f407405243a480a1a50597d2428810

  • SHA512

    bdddfd527bd9eff24d38f4114f1527e7bc38dc3fc58ffca267ef741b70a2dbff134a8442ef33be2e5cefaa0b0b1ec4cbeb6dd49d159f7e65e6ec7fc0d679f8db

Malware Config

Targets

    • Target

      03f42ed6_uphdOxj4_3

    • Size

      207KB

    • MD5

      03f42ed6e4f5e621434500ce13567023

    • SHA1

      447e833b37da6f032ff2933c035346b508db92fd

    • SHA256

      9ae44da8053f269d4adfc30da8f62d1362f407405243a480a1a50597d2428810

    • SHA512

      bdddfd527bd9eff24d38f4114f1527e7bc38dc3fc58ffca267ef741b70a2dbff134a8442ef33be2e5cefaa0b0b1ec4cbeb6dd49d159f7e65e6ec7fc0d679f8db

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks