General

  • Target

    Detailed_pop.tar

  • Size

    30KB

  • Sample

    210914-bwjxaahfep

  • MD5

    e5a59dae2f4cb82d78e1fbecc75c3fc0

  • SHA1

    2664472dea78d472e06412454d0ef5bcf5e3a5d4

  • SHA256

    18666399cac7e3efeffcb43ee29ec6dab97e8e47e2d0bcb82a10b8e7097be2c0

  • SHA512

    1338f92e3d3f368054081f51765553cafc68fa07dbb6d7b7b56f3b6f59db3fed16a40692d92936f31fc078fa4c277967d58b6a13089e653db1fb3fb94c0d5927

Malware Config

Targets

    • Target

      Detailed_pop.js

    • Size

      28KB

    • MD5

      463bd0d247978c6c518dc1189629eab1

    • SHA1

      641c5f4e60b63a06aa28db3c56c35a6040df12d7

    • SHA256

      5327513b498e18027849c6f8e2d2d3edb149e2f154286e70e14633b48582dd0c

    • SHA512

      37204d2c29d140a02b339b5faa15aceb6c35513ab00eedc33d91c6a8a54929eab878ec5de84fd216bfebba612b1af869854bb38cc095964ec66d2b46bfea9746

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks