General

  • Target

    PAYMENT-COPY.js

  • Size

    9KB

  • Sample

    211208-xs8bcsacbq

  • MD5

    7a04840e07461ac2dfa2bf45173587d8

  • SHA1

    70285f4b9f5fab2ebd4797bf44d7ac4ef580b2de

  • SHA256

    ffff88cae6d4f0d41580526be732216678392fd135a3482cb83d9b25ba336d37

  • SHA512

    fc2dcff2c301008015e0e4f85b88cc7031d35df5f8d24893c5f9365ecc58b41d3d19cbf3cea94f507c49fc2276ba77dc876c16d15e10d9ee2f839499172db5ff

Malware Config

Extracted

Family

vjw0rm

C2

http://mikeleejs.duckdns.org:2190

Targets

    • Target

      PAYMENT-COPY.js

    • Size

      9KB

    • MD5

      7a04840e07461ac2dfa2bf45173587d8

    • SHA1

      70285f4b9f5fab2ebd4797bf44d7ac4ef580b2de

    • SHA256

      ffff88cae6d4f0d41580526be732216678392fd135a3482cb83d9b25ba336d37

    • SHA512

      fc2dcff2c301008015e0e4f85b88cc7031d35df5f8d24893c5f9365ecc58b41d3d19cbf3cea94f507c49fc2276ba77dc876c16d15e10d9ee2f839499172db5ff

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks