General

  • Target

    f4a519cdca700c3e6edb471a4a0e52f42b16fa1dbeed756beafc481b4b867c60

  • Size

    34KB

  • Sample

    220206-y2qncabgc7

  • MD5

    554d30067b0edea56a24baab1279d9ad

  • SHA1

    9a6ea91e49c1622576fe8a2465414f1c9c4ac712

  • SHA256

    f4a519cdca700c3e6edb471a4a0e52f42b16fa1dbeed756beafc481b4b867c60

  • SHA512

    dfeb820ca2d311c91a7caa095eee586ed1911427917a9c25b17519205768bf1e225735a86418f79ad56f7a771285f1a38c8f1185606287dc8c5e7ec7633bb9b8

Score
10/10

Malware Config

Targets

    • Target

      TransferReceipt.js

    • Size

      32KB

    • MD5

      13b19bb0f4c15c58b6d01103bbde3411

    • SHA1

      a9824d4a4c04cdd594bf17f0c2cf8d39a2f31321

    • SHA256

      07d6e04c6c7905d9a1281d14f8e5b2ce33b6eaae92db4e07b9e1cdc4dff750fb

    • SHA512

      59d0e7a935429fc9ea55574a2d96784148de86e56d0b60b0b9b063e834b5550f0f3bc37701c2513dd289fc101fe444d40550a5b608384ce41a60252efa9dbd82

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks