General

  • Target

    TOO89_Payment_Invoice.js

  • Size

    12KB

  • Sample

    211018-yepsjaeed4

  • MD5

    3e7dd715a15046585cb8034a1fa847b3

  • SHA1

    4cbe1b633a7859821c0b7082385407cb140a0ba5

  • SHA256

    5518f5e20b27a4b10ebc7abce37c733ab532354b5db6aed7edf19c25caba2ff3

  • SHA512

    42777bf0328fe9844aa93e8394f11aba8d02d6bbc77980da2c22bb5b9f9a646763ed4506976dfbf3d2476ca63fbc0845bb5be64c3a6c745daffdd7f7d85f960a

Malware Config

Extracted

Family

vjw0rm

C2

http://btime1624.duckdns.org:7923

Targets

    • Target

      TOO89_Payment_Invoice.js

    • Size

      12KB

    • MD5

      3e7dd715a15046585cb8034a1fa847b3

    • SHA1

      4cbe1b633a7859821c0b7082385407cb140a0ba5

    • SHA256

      5518f5e20b27a4b10ebc7abce37c733ab532354b5db6aed7edf19c25caba2ff3

    • SHA512

      42777bf0328fe9844aa93e8394f11aba8d02d6bbc77980da2c22bb5b9f9a646763ed4506976dfbf3d2476ca63fbc0845bb5be64c3a6c745daffdd7f7d85f960a

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks