General

  • Target

    eReceipt.img

  • Size

    1.2MB

  • Sample

    211022-wrsnvabhf4

  • MD5

    c4d6e571926521af01c3b740e917166f

  • SHA1

    0838ac562d8c231f471ee016efd2c58f7e9d9f0e

  • SHA256

    ed8e23c9297e8ead61aff74b1cf398c5fdcb1998ff8bc09baeece1ef9453061c

  • SHA512

    4b68f6af82b4ec1211b54f02008694c31296a1f404dd9a25895ba455e918b957c1faa295d00729705fb31d0da0ba612b6c5a16fd3c0936871155b3215199743d

Malware Config

Extracted

Family

vjw0rm

C2

http://loadcash.duckdns.org:7779

http://gameserver-789.duia.ro:6789

Targets

    • Target

      ERECEIPT.JS

    • Size

      23KB

    • MD5

      f041d2da1a5839119c042afda5c966ad

    • SHA1

      78dee5cee82ae393737ddbff9ccf13ad460f6711

    • SHA256

      88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677

    • SHA512

      1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks