General

  • Target

    Purchase Contract.js

  • Size

    31KB

  • Sample

    211202-ty6syadee7

  • MD5

    015a0a4c64c8ce840ffe844b3be1584b

  • SHA1

    8aa1cd8dfc3e03f20a20ee8f647c74a884895f60

  • SHA256

    63bca571548f7d4b53522b9c39667baf14a6341c299960098c508dfb55697ac7

  • SHA512

    b72fd08b996ec54556f4de7c94eb6bf1b05d94c98077420eac7c89cdbfa21e7a8e423afa283f8b1752518a194f7d37e4f1458b80cf16c214624c4aaafbe21a8f

Malware Config

Extracted

Family

vjw0rm

C2

http://spdxx.ddns.net:5050

Targets

    • Target

      Purchase Contract.js

    • Size

      31KB

    • MD5

      015a0a4c64c8ce840ffe844b3be1584b

    • SHA1

      8aa1cd8dfc3e03f20a20ee8f647c74a884895f60

    • SHA256

      63bca571548f7d4b53522b9c39667baf14a6341c299960098c508dfb55697ac7

    • SHA512

      b72fd08b996ec54556f4de7c94eb6bf1b05d94c98077420eac7c89cdbfa21e7a8e423afa283f8b1752518a194f7d37e4f1458b80cf16c214624c4aaafbe21a8f

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks