General

  • Target

    INTERAC Service Request9466544665440.js

  • Size

    3KB

  • Sample

    211006-xkv13abeb5

  • MD5

    82ccbb5d83d342bf2a38081b98b1704d

  • SHA1

    7b72886e685c44f752a72826c315f86dee81251f

  • SHA256

    1204d1db36163eef881e0e2293c27fa3b83f036e1c5f8b9f39eee6de138b8752

  • SHA512

    05d9ed5a6499d4bd920f27d5e750874fdd812811117ce2fd4fbc4587a5f3121bf9d6b5f512c345c1cfa02ccad94c098758570b7c1d4dd173de60a093abd921a9

Malware Config

Targets

    • Target

      INTERAC Service Request9466544665440.js

    • Size

      3KB

    • MD5

      82ccbb5d83d342bf2a38081b98b1704d

    • SHA1

      7b72886e685c44f752a72826c315f86dee81251f

    • SHA256

      1204d1db36163eef881e0e2293c27fa3b83f036e1c5f8b9f39eee6de138b8752

    • SHA512

      05d9ed5a6499d4bd920f27d5e750874fdd812811117ce2fd4fbc4587a5f3121bf9d6b5f512c345c1cfa02ccad94c098758570b7c1d4dd173de60a093abd921a9

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks