General

  • Target

    receipt#009.js

  • Size

    376KB

  • Sample

    220112-1dl2cseagq

  • MD5

    ffd5990d98bc47c9afcc11f8598659ee

  • SHA1

    869c90b42db526e1bc528d344882f8efb298d357

  • SHA256

    e510b8ef2e0644798c793d22303014ae443230c788c8dac026bf966f27779266

  • SHA512

    eec0b5fd6bffa6bc2c0fceea752c443227a89231558cb2834643aa28a747d2970e1d4091628f0e186b27936f77df549470a41417ba7de2d2648dad5da6f63b1f

Malware Config

Extracted

Family

vjw0rm

C2

http://warrr.duckdns.org:9997

Targets

    • Target

      receipt#009.js

    • Size

      376KB

    • MD5

      ffd5990d98bc47c9afcc11f8598659ee

    • SHA1

      869c90b42db526e1bc528d344882f8efb298d357

    • SHA256

      e510b8ef2e0644798c793d22303014ae443230c788c8dac026bf966f27779266

    • SHA512

      eec0b5fd6bffa6bc2c0fceea752c443227a89231558cb2834643aa28a747d2970e1d4091628f0e186b27936f77df549470a41417ba7de2d2648dad5da6f63b1f

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks