General

  • Target

    bb4fc8b24c345743968f905c9f3f7a47e008e787df111236e54dd02dbb6b3ebc

  • Size

    471KB

  • Sample

    220203-sv5k2abad2

  • MD5

    2ab5df8bedd64d6f06b3e885ae422cd0

  • SHA1

    cf1f4cdf495a05eb143e5448eee6ee4ce527108e

  • SHA256

    bb4fc8b24c345743968f905c9f3f7a47e008e787df111236e54dd02dbb6b3ebc

  • SHA512

    587ca78b25c4498d5402d0a35ec55f1a693866507e0c5a9d30ac8f3e910e5256c906966a14de209b8fb1dffde3cc10d5759344a175ee4cfbb75e5bdcd982d30d

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://cdn.discordapp.com/attachments/858084271553249342/863039759001452564/Main.png

Targets

    • Target

      bb4fc8b24c345743968f905c9f3f7a47e008e787df111236e54dd02dbb6b3ebc

    • Size

      471KB

    • MD5

      2ab5df8bedd64d6f06b3e885ae422cd0

    • SHA1

      cf1f4cdf495a05eb143e5448eee6ee4ce527108e

    • SHA256

      bb4fc8b24c345743968f905c9f3f7a47e008e787df111236e54dd02dbb6b3ebc

    • SHA512

      587ca78b25c4498d5402d0a35ec55f1a693866507e0c5a9d30ac8f3e910e5256c906966a14de209b8fb1dffde3cc10d5759344a175ee4cfbb75e5bdcd982d30d

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks