General

  • Target

    eReceipt.js

  • Size

    23KB

  • Sample

    211023-gek1xacbb9

  • MD5

    f041d2da1a5839119c042afda5c966ad

  • SHA1

    78dee5cee82ae393737ddbff9ccf13ad460f6711

  • SHA256

    88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677

  • SHA512

    1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81

Malware Config

Targets

    • Target

      eReceipt.js

    • Size

      23KB

    • MD5

      f041d2da1a5839119c042afda5c966ad

    • SHA1

      78dee5cee82ae393737ddbff9ccf13ad460f6711

    • SHA256

      88831eb51e1546b02091a0b2508f19e82c1feea3fec4d4c10fac83e3df107677

    • SHA512

      1838dc189474e0896cc5e800d0595ede6a6bc0c6535a3eb247cb2b0525763c923615762de7857ade40ecd970b8b3ef0a33075d2bae9b22e2d5aad7ae0ba37a81

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks