General

  • Target

    WSQUOM_Invoice009.js

  • Size

    23KB

  • Sample

    211130-w92dpsbah9

  • MD5

    155dfc9ae56dcfde29651063fe46a32b

  • SHA1

    5294ccf5be250ada21486abac58a1f6a9b36ba42

  • SHA256

    69177cc4ac05e4287486bc3b24816762894c3275124b4a20a7671b48bff2b336

  • SHA512

    6673f8c63e7588e5bc483cf8982839b9f8097624399722803047892dd5530cf360e29472d3392a4b6305680c51e59dab378ca72f1089b74a4d1b06a210899b72

Malware Config

Extracted

Family

vjw0rm

C2

http://37.0.10.5:8020

Targets

    • Target

      WSQUOM_Invoice009.js

    • Size

      23KB

    • MD5

      155dfc9ae56dcfde29651063fe46a32b

    • SHA1

      5294ccf5be250ada21486abac58a1f6a9b36ba42

    • SHA256

      69177cc4ac05e4287486bc3b24816762894c3275124b4a20a7671b48bff2b336

    • SHA512

      6673f8c63e7588e5bc483cf8982839b9f8097624399722803047892dd5530cf360e29472d3392a4b6305680c51e59dab378ca72f1089b74a4d1b06a210899b72

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks