General

  • Target

    #VOOSNA8220.js

  • Size

    10KB

  • Sample

    211023-ge6bvacbc2

  • MD5

    03e2273476d1f37afc635d397e348e26

  • SHA1

    f117888480345fa24c3265ee42f2e41203369f5c

  • SHA256

    47db324fe95c246da48fe4c085c0d835c68d107ed1c19aa2d957d1acd1bc1c24

  • SHA512

    05b628e15a77f2b92f0ce0405aee88feac42bc86ecef80f1c57d1a03f6567bec005b2ec10b635b808468904a36aaa4f20010e69a1ba13ceda44749fb062a5201

Malware Config

Extracted

Family

vjw0rm

C2

http://gg1592661.duckdns.org:7924

Targets

    • Target

      #VOOSNA8220.js

    • Size

      10KB

    • MD5

      03e2273476d1f37afc635d397e348e26

    • SHA1

      f117888480345fa24c3265ee42f2e41203369f5c

    • SHA256

      47db324fe95c246da48fe4c085c0d835c68d107ed1c19aa2d957d1acd1bc1c24

    • SHA512

      05b628e15a77f2b92f0ce0405aee88feac42bc86ecef80f1c57d1a03f6567bec005b2ec10b635b808468904a36aaa4f20010e69a1ba13ceda44749fb062a5201

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks