General

  • Target

    367a5929a2fab1244d330113183cdd0b56bdbfcaf857d89eb757e766bca3a58b

  • Size

    224KB

  • Sample

    220203-vcrmkacbek

  • MD5

    0479d1bf5fbad7e0056ffb4828db8c42

  • SHA1

    bc98d1774bd56ce23afff680b7b5946303ed2885

  • SHA256

    367a5929a2fab1244d330113183cdd0b56bdbfcaf857d89eb757e766bca3a58b

  • SHA512

    42dd47f5d96fab63316e3efab92ff699c65419c97b5acc6f64abcdaabb7d8ae21adbf3f8190582d3161ef5eaae97076cd3f9c2f8fbed960616ab2fadc490b28d

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://cdn.discordapp.com/attachments/858084204901564479/864969154494201866/Main.png

Targets

    • Target

      367a5929a2fab1244d330113183cdd0b56bdbfcaf857d89eb757e766bca3a58b

    • Size

      224KB

    • MD5

      0479d1bf5fbad7e0056ffb4828db8c42

    • SHA1

      bc98d1774bd56ce23afff680b7b5946303ed2885

    • SHA256

      367a5929a2fab1244d330113183cdd0b56bdbfcaf857d89eb757e766bca3a58b

    • SHA512

      42dd47f5d96fab63316e3efab92ff699c65419c97b5acc6f64abcdaabb7d8ae21adbf3f8190582d3161ef5eaae97076cd3f9c2f8fbed960616ab2fadc490b28d

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks