General

  • Target

    Order20827.js

  • Size

    307KB

  • Sample

    211213-yxrd3sebh5

  • MD5

    d3d3edd039a3e591e822bb981e7e1fc7

  • SHA1

    dc79c1c6268f32dbe746394868db3d23bd4e4126

  • SHA256

    528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf

  • SHA512

    f377e3a8d3816130cf5db479e980bfad2b2dc13b86b7eee297b0fb9982a808751e429bbd10263fa6b61a066869e67bb88205ae83f27d5527e99cd7c9b5dfba95

Malware Config

Extracted

Family

vjw0rm

C2

http://dwal-vesj.duckdns.org:29563

Targets

    • Target

      Order20827.js

    • Size

      307KB

    • MD5

      d3d3edd039a3e591e822bb981e7e1fc7

    • SHA1

      dc79c1c6268f32dbe746394868db3d23bd4e4126

    • SHA256

      528452ce702d1bc05f0c968137625ae1518faf152aeac200948e39974c6ef4cf

    • SHA512

      f377e3a8d3816130cf5db479e980bfad2b2dc13b86b7eee297b0fb9982a808751e429bbd10263fa6b61a066869e67bb88205ae83f27d5527e99cd7c9b5dfba95

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks