General

  • Target

    UPS 1ZF1939R0198605672.js

  • Size

    85KB

  • Sample

    211223-kce9esaagn

  • MD5

    cecc5ef246b78035fd37775f6a09424e

  • SHA1

    a7f6ca9e2ecea0a8a7dacabbdaecfe3659497f6e

  • SHA256

    3455386680d2443e47c0931ec1ffc3f1db1f1744dd0b35d66d6a8d66f976e7d4

  • SHA512

    df92e9c94c02bc6cf2c8d7701a5bbfd637a0516fe5c8f209f416e290e4d5fcc6aa37e0cd50e8044db74599c16380f49138b451516f98ce0bf5f990e553dc83b1

Malware Config

Extracted

Family

vjw0rm

C2

http://spdxx.ddns.net:5050

Targets

    • Target

      UPS 1ZF1939R0198605672.js

    • Size

      85KB

    • MD5

      cecc5ef246b78035fd37775f6a09424e

    • SHA1

      a7f6ca9e2ecea0a8a7dacabbdaecfe3659497f6e

    • SHA256

      3455386680d2443e47c0931ec1ffc3f1db1f1744dd0b35d66d6a8d66f976e7d4

    • SHA512

      df92e9c94c02bc6cf2c8d7701a5bbfd637a0516fe5c8f209f416e290e4d5fcc6aa37e0cd50e8044db74599c16380f49138b451516f98ce0bf5f990e553dc83b1

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks