General

  • Target

    aclui.dll.js

  • Size

    59KB

  • Sample

    220104-tep13shehk

  • MD5

    af53441dec206e887c7c20869fe1647d

  • SHA1

    f3b64eb8925877a85c50f8539b93a5f74a4b358f

  • SHA256

    f0b03690f72003de3b6e42cf0d23d8840a42b45b16ec469572d16f1fe8d8f98d

  • SHA512

    ddc461a12722df2914ea32e2a5a1035f19b697bde695449db48812471e6ceccf9540be16bfbf80a4f15aba686a8e71aa223887ca91ee65e45ae3964c65e80b57

Malware Config

Targets

    • Target

      aclui.dll.js

    • Size

      59KB

    • MD5

      af53441dec206e887c7c20869fe1647d

    • SHA1

      f3b64eb8925877a85c50f8539b93a5f74a4b358f

    • SHA256

      f0b03690f72003de3b6e42cf0d23d8840a42b45b16ec469572d16f1fe8d8f98d

    • SHA512

      ddc461a12722df2914ea32e2a5a1035f19b697bde695449db48812471e6ceccf9540be16bfbf80a4f15aba686a8e71aa223887ca91ee65e45ae3964c65e80b57

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks