General

  • Target

    b7d72ba9c972b6bab9cd737ac0856fa8b6a67426ee1fbe405b1a968199880378

  • Size

    64KB

  • Sample

    220206-z57ayacagp

  • MD5

    d05bfea212bb82c7e6e2ba74207c4469

  • SHA1

    e7ed796e8e4bba6e70d4783c6dcfb60a078348d1

  • SHA256

    b7d72ba9c972b6bab9cd737ac0856fa8b6a67426ee1fbe405b1a968199880378

  • SHA512

    cb99f9ebb466e9ee994eab5e3fd83b8fff6079ee4e3451e471c8afd88865d7ffbdd2c68f5f9ce70d4e4d704cbbef8141415c797041a43a17a464a930449820fc

Malware Config

Targets

    • Target

      b7d72ba9c972b6bab9cd737ac0856fa8b6a67426ee1fbe405b1a968199880378

    • Size

      64KB

    • MD5

      d05bfea212bb82c7e6e2ba74207c4469

    • SHA1

      e7ed796e8e4bba6e70d4783c6dcfb60a078348d1

    • SHA256

      b7d72ba9c972b6bab9cd737ac0856fa8b6a67426ee1fbe405b1a968199880378

    • SHA512

      cb99f9ebb466e9ee994eab5e3fd83b8fff6079ee4e3451e471c8afd88865d7ffbdd2c68f5f9ce70d4e4d704cbbef8141415c797041a43a17a464a930449820fc

    Score
    4/10
    • Target

      ,,Payment_Receipt,,.js

    • Size

      3KB

    • MD5

      efbb72e784d2eeba8b4a1e560bda8bd5

    • SHA1

      e5f7c20bac9163ea3e45cefd331d414b19cec52c

    • SHA256

      af85de0f377deb278411bec90970fcb2edef0449912cd6ec41d94c5ea17116c7

    • SHA512

      54719e06a164d468377af9e243178a896bd8f5cd69218bed619f5c3e6c370871a4ea4258985688d6a532b183fd53e68dc36ffa2a57cfea7e67b517f29467c3fd

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

1
T1012

Tasks