General

  • Target

    GKOPEWRYU.iso

  • Size

    122KB

  • Sample

    211220-wj6kqsccbl

  • MD5

    697f93ec8a97a34fe7b9bdea5402f5bc

  • SHA1

    79c6167d15683955acf57bfb27ffaf95e744c6ef

  • SHA256

    3829deaf6c93e3b738facd283001b5fa40fb0f6d74f834e815dbb0a552d73383

  • SHA512

    138dac98b4d52ac744f5855f814148996f58195f3c3bdfe63366719e9561d4cccfdde8961fdf8a210e7c33e54be19c05bd5e49518b599b9386e153216c8db90c

Malware Config

Extracted

Family

vjw0rm

C2

http://moneyworm.duckdns.org:8756

Targets

    • Target

      GKOPEWRYU.js

    • Size

      61KB

    • MD5

      6c65767545d7ad14fa6f2aa28fdd37e1

    • SHA1

      7a31fc2c58c387e538b8d2c6e288cfacee899ea2

    • SHA256

      4659be2ae1f69a483f84a858f35ab0b184031a1dbdccfb8b89decaa75004f249

    • SHA512

      73161f26b1cbd297c89a7b9811837b3bae6a44bf022aadd94ec1c57daddc2092c43809b002e4aab2cd59ecd2cb8ad106ede24d459be2831bf38537c6b8396ea8

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks