General

  • Target

    temp.js

  • Size

    81KB

  • Sample

    211013-vv2v9aeedp

  • MD5

    cef5ae43fcc340029300954a60931ca5

  • SHA1

    f7f67f70c25c1a7d59ed79e896ef47b0efa83d86

  • SHA256

    c05fa4aabfad177a35fb044dfbe9354a91a7e06ccba7e9b1aa349a7b11f3c6ab

  • SHA512

    4e8a0fe5a850ec7db3cc1e30f609e02a7934eba6e0e2978d304d32573606a75565b0ab7bc7d3f3979b9eeb70ce380f9d1d1f17cb80564c2ed786efbe03ec8804

Malware Config

Extracted

Family

vjw0rm

C2

http://7700js.duckdns.org:7700

Targets

    • Target

      temp.js

    • Size

      81KB

    • MD5

      cef5ae43fcc340029300954a60931ca5

    • SHA1

      f7f67f70c25c1a7d59ed79e896ef47b0efa83d86

    • SHA256

      c05fa4aabfad177a35fb044dfbe9354a91a7e06ccba7e9b1aa349a7b11f3c6ab

    • SHA512

      4e8a0fe5a850ec7db3cc1e30f609e02a7934eba6e0e2978d304d32573606a75565b0ab7bc7d3f3979b9eeb70ce380f9d1d1f17cb80564c2ed786efbe03ec8804

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks