General

  • Target

    js-decoded-2.js

  • Size

    3KB

  • Sample

    211208-tk11jagcd2

  • MD5

    ba117b8642f2381e72d02038c640beca

  • SHA1

    a9634ae1c4448cbf61a238c988ee5ca8e9b5c849

  • SHA256

    d6b19a4522d42fc22a9f6872fa48203c7c64ebcc769157e372d390c1c96ed746

  • SHA512

    64207d114ab1127b266c539003848bb3a5ab556cf3d0871ce282490e1f09aa302a3c26533bd16a86f966023133d4edd01d0b1c21344fb5f4a35dda09f49aad28

Malware Config

Targets

    • Target

      js-decoded-2.js

    • Size

      3KB

    • MD5

      ba117b8642f2381e72d02038c640beca

    • SHA1

      a9634ae1c4448cbf61a238c988ee5ca8e9b5c849

    • SHA256

      d6b19a4522d42fc22a9f6872fa48203c7c64ebcc769157e372d390c1c96ed746

    • SHA512

      64207d114ab1127b266c539003848bb3a5ab556cf3d0871ce282490e1f09aa302a3c26533bd16a86f966023133d4edd01d0b1c21344fb5f4a35dda09f49aad28

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks