General

  • Target

    INTERAC Service Request9466544665440.img

  • Size

    1.2MB

  • Sample

    211006-vdflpabffq

  • MD5

    99982ef35da4ed149986f3b4541c76c9

  • SHA1

    d1b3f044244dd00cb4d2acd07ecd55adfb94096e

  • SHA256

    085d8c16d8eb719996170887bccdc9c7d93c941ecd25b4b7931b16945c2b2a17

  • SHA512

    cc10dcb150d398df1553318bc1761fb0debbf03f8135d3fa323f765367b8e19904c532e565aadf58f9ba5d85640e40ea6d35ac4826d9c900a2be4e386c4a93fb

Malware Config

Targets

    • Target

      INTERAC_.JS

    • Size

      3KB

    • MD5

      82ccbb5d83d342bf2a38081b98b1704d

    • SHA1

      7b72886e685c44f752a72826c315f86dee81251f

    • SHA256

      1204d1db36163eef881e0e2293c27fa3b83f036e1c5f8b9f39eee6de138b8752

    • SHA512

      05d9ed5a6499d4bd920f27d5e750874fdd812811117ce2fd4fbc4587a5f3121bf9d6b5f512c345c1cfa02ccad94c098758570b7c1d4dd173de60a093abd921a9

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks