General

  • Target

    Sample_Perspective.js

  • Size

    3KB

  • Sample

    211019-kfa4wagchl

  • MD5

    47df1ed785e92db6d5596a0b096d7b7f

  • SHA1

    f3c30187cb9b60fe2358eb5aa0ec8c5022e5fed6

  • SHA256

    e735d8a4c0a6b26e3b15cfa8f5d917cad6f20fd2e948a706bf832c17ecefecd0

  • SHA512

    290366655337057615937929d2cad7f8749817575d7c67620bba68e2723b48151c38e379c4bfd45d75f918c59f0d774b8767dfee08565d02aef8e1b99a405887

Malware Config

Extracted

Family

vjw0rm

C2

http://jswormpeople.duckdns.org:1921

Targets

    • Target

      Sample_Perspective.js

    • Size

      3KB

    • MD5

      47df1ed785e92db6d5596a0b096d7b7f

    • SHA1

      f3c30187cb9b60fe2358eb5aa0ec8c5022e5fed6

    • SHA256

      e735d8a4c0a6b26e3b15cfa8f5d917cad6f20fd2e948a706bf832c17ecefecd0

    • SHA512

      290366655337057615937929d2cad7f8749817575d7c67620bba68e2723b48151c38e379c4bfd45d75f918c59f0d774b8767dfee08565d02aef8e1b99a405887

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks