General

  • Target

    #UDHSOPX SNSS.js

  • Size

    124KB

  • Sample

    211208-xsmpnaacap

  • MD5

    b3cab5d863bf3993f0064be3b01bf66f

  • SHA1

    cb03bc17ceba185ca3c01a240db8adad20d4cecd

  • SHA256

    7a9dd7cccb4799b76aa79b826b461002386797a76b7c6e3a396ff3813e8485a3

  • SHA512

    c35589b090d5b1239dd07da193acf2245ccb3d875c663d2c32be999468993595f6348f6eb9880ada744d8fd78c5348490c60500c1ef58e4b3e6491614d01e83c

Malware Config

Targets

    • Target

      #UDHSOPX SNSS.js

    • Size

      124KB

    • MD5

      b3cab5d863bf3993f0064be3b01bf66f

    • SHA1

      cb03bc17ceba185ca3c01a240db8adad20d4cecd

    • SHA256

      7a9dd7cccb4799b76aa79b826b461002386797a76b7c6e3a396ff3813e8485a3

    • SHA512

      c35589b090d5b1239dd07da193acf2245ccb3d875c663d2c32be999468993595f6348f6eb9880ada744d8fd78c5348490c60500c1ef58e4b3e6491614d01e83c

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks