General

  • Target

    #TWF0027VAG.js

  • Size

    6KB

  • Sample

    210922-vj5g1afghl

  • MD5

    98ea7ba80213c564ff8f9413aed1ef2c

  • SHA1

    75f44be41b21837b8a5755cf13a4af47277c3c10

  • SHA256

    7b07f5c8544d1f7a6922848e574e265ddeaffa87b8d94a4e519c10196b7ad3af

  • SHA512

    77b831efdfc8995dda1bae897a278dd201990a6b5ffe587d6f85945a64492421344c63863a6d5815127df1f2e037aa0fa1dfddb4ac25acb073b8814ab0eda683

Malware Config

Targets

    • Target

      #TWF0027VAG.js

    • Size

      6KB

    • MD5

      98ea7ba80213c564ff8f9413aed1ef2c

    • SHA1

      75f44be41b21837b8a5755cf13a4af47277c3c10

    • SHA256

      7b07f5c8544d1f7a6922848e574e265ddeaffa87b8d94a4e519c10196b7ad3af

    • SHA512

      77b831efdfc8995dda1bae897a278dd201990a6b5ffe587d6f85945a64492421344c63863a6d5815127df1f2e037aa0fa1dfddb4ac25acb073b8814ab0eda683

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks