General

  • Target

    Payment-Comfirmation.js

  • Size

    3KB

  • Sample

    211217-vqvalsegal

  • MD5

    02dca57d9291c141771e24ed47099e99

  • SHA1

    4ceb5dda4962c9d87ea07e536d5fa75dd9138212

  • SHA256

    76d15369afac3929d48b5822fe81c4c39626a59f3dea4120b8b629436b86c11c

  • SHA512

    18f268a7f0f226408444ec73827987fd98736fb7bb77f06b86e2fc47295926ba407fa647ab9d13d055fb2fe5e07a88dc178dfcecff580cf7a32be52c38eafe5f

Malware Config

Extracted

Family

vjw0rm

C2

http://12345h.duckdns.org:3030

Targets

    • Target

      Payment-Comfirmation.js

    • Size

      3KB

    • MD5

      02dca57d9291c141771e24ed47099e99

    • SHA1

      4ceb5dda4962c9d87ea07e536d5fa75dd9138212

    • SHA256

      76d15369afac3929d48b5822fe81c4c39626a59f3dea4120b8b629436b86c11c

    • SHA512

      18f268a7f0f226408444ec73827987fd98736fb7bb77f06b86e2fc47295926ba407fa647ab9d13d055fb2fe5e07a88dc178dfcecff580cf7a32be52c38eafe5f

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks