General

  • Target

    POS_1.js

  • Size

    28KB

  • Sample

    210911-xz2gdsefhr

  • MD5

    e42d34f7c318c8f4444331b58517a582

  • SHA1

    083c8fa495b38c1509a267c1a07873caf914b57b

  • SHA256

    e4a7c3ccf07158984d50ebb1124663776ad95d9e857fea7eef5ce87eb9bc62f3

  • SHA512

    7efa350496c915fdb703c8742bf15c99a9767c8a1f15738dc4ead64cd6d296eef26ed2eb60b34e1587ac0b3b53aa56730cfe9710f98ac8d6cf7cc65ad499d4cc

Malware Config

Targets

    • Target

      POS_1.js

    • Size

      28KB

    • MD5

      e42d34f7c318c8f4444331b58517a582

    • SHA1

      083c8fa495b38c1509a267c1a07873caf914b57b

    • SHA256

      e4a7c3ccf07158984d50ebb1124663776ad95d9e857fea7eef5ce87eb9bc62f3

    • SHA512

      7efa350496c915fdb703c8742bf15c99a9767c8a1f15738dc4ead64cd6d296eef26ed2eb60b34e1587ac0b3b53aa56730cfe9710f98ac8d6cf7cc65ad499d4cc

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks