General

  • Target

    IMAGES_AND_PROPERTY_INFORMAION.js

  • Size

    3KB

  • Sample

    211021-w6ltvabeen

  • MD5

    d5ddd5da3c52de3c39474f28dc0cd278

  • SHA1

    fa59e45d11763c7a0558dc0c91f95254f06c9f8f

  • SHA256

    be525208f6918222a4f898d4411eb96254213ad46eb00f22500b49f05f86048e

  • SHA512

    1f89a654f1a0e2c8ea8e2a1e472f25620548b6f290dd5e7e9e164097f48613312d79d79c6a974f93800e9d3797353f8df1bd82c15d563e3b598b665a8be56f58

Malware Config

Extracted

Family

vjw0rm

C2

http://jswormpeople.duckdns.org:1921

Targets

    • Target

      IMAGES_AND_PROPERTY_INFORMAION.js

    • Size

      3KB

    • MD5

      d5ddd5da3c52de3c39474f28dc0cd278

    • SHA1

      fa59e45d11763c7a0558dc0c91f95254f06c9f8f

    • SHA256

      be525208f6918222a4f898d4411eb96254213ad46eb00f22500b49f05f86048e

    • SHA512

      1f89a654f1a0e2c8ea8e2a1e472f25620548b6f290dd5e7e9e164097f48613312d79d79c6a974f93800e9d3797353f8df1bd82c15d563e3b598b665a8be56f58

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks