General

  • Target

    TZK00UWRTQ002.js

  • Size

    9KB

  • Sample

    211222-xcw86agfcp

  • MD5

    5d0e8c847065aa21cc27b2754d5b2b23

  • SHA1

    dc386566971cf693954cc55df6d6c509081221ac

  • SHA256

    daf0babcdc3283dd81fcd4522978cdfd900c0edd44cc3ad6c7b24433a221c796

  • SHA512

    3a639791404fc7b02163b1230b381d0258ff7fd1ed61e638837e30a12c12eebb8ea9cd53a6ab0d8374fc916367a15a8075a39f9478039120a1e028e85af0c173

Malware Config

Extracted

Family

vjw0rm

C2

http://wormmy.duckdns.org:8990

Targets

    • Target

      TZK00UWRTQ002.js

    • Size

      9KB

    • MD5

      5d0e8c847065aa21cc27b2754d5b2b23

    • SHA1

      dc386566971cf693954cc55df6d6c509081221ac

    • SHA256

      daf0babcdc3283dd81fcd4522978cdfd900c0edd44cc3ad6c7b24433a221c796

    • SHA512

      3a639791404fc7b02163b1230b381d0258ff7fd1ed61e638837e30a12c12eebb8ea9cd53a6ab0d8374fc916367a15a8075a39f9478039120a1e028e85af0c173

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks