General

  • Target

    #VOOSNA8220.ISO

  • Size

    1.2MB

  • Sample

    211022-vnqjmscgep

  • MD5

    0d8e595faf5bc8062d9ae29e81e13497

  • SHA1

    e9ad13ca961267ee9770f511f361d627bb5fccab

  • SHA256

    05a5445b613b1eaf3dc883e66425e32040b4d446d635ae9a99d0854d4767e29d

  • SHA512

    e70c50b10223a1a08e4da9316c7be6f03a0125721ed0d28fe9d5b61eaa74ff0216d0d6ffee324689e906f4c3ab015bd5cb2d8fbb28726917c32e246e20eaec24

Malware Config

Extracted

Family

vjw0rm

C2

http://gg1592661.duckdns.org:7924

Targets

    • Target

      _VOOSNA8.JS

    • Size

      10KB

    • MD5

      03e2273476d1f37afc635d397e348e26

    • SHA1

      f117888480345fa24c3265ee42f2e41203369f5c

    • SHA256

      47db324fe95c246da48fe4c085c0d835c68d107ed1c19aa2d957d1acd1bc1c24

    • SHA512

      05b628e15a77f2b92f0ce0405aee88feac42bc86ecef80f1c57d1a03f6567bec005b2ec10b635b808468904a36aaa4f20010e69a1ba13ceda44749fb062a5201

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks