General

  • Target

    7f205faa4e3efc5c69c39bd714e4578511cda0c2c53ba01ca208b55a3a21954a

  • Size

    27KB

  • Sample

    220207-189e5saee6

  • MD5

    eba028e515f7ab126753a9f0e2dc4b1e

  • SHA1

    647d962a1a72021707c0753269d3f6b82e04ab19

  • SHA256

    7f205faa4e3efc5c69c39bd714e4578511cda0c2c53ba01ca208b55a3a21954a

  • SHA512

    a8f952047db2e354bd5c8e6eb6851d6bafc37677375b546557abd60f84bea90b9642631a9bccf12e81dbd1f3bd914607e8a1fbbd5ad3e4776debd57deb1adbb5

Score
10/10

Malware Config

Targets

    • Target

      PaymentReceipy.js

    • Size

      25KB

    • MD5

      656fc1d85b05c8e8055d66a5968e4124

    • SHA1

      92d9e5ff24aa8be8d546f2883cf263d07358c629

    • SHA256

      852aa3c31a05674bc43143e9d8586db07e7ffd782fcaec1f9383726f6330c90a

    • SHA512

      8f9f63ef76c2d553bfa0ec68adf6fae028383921634d1a9f04dd2828f02e0a8ea45b0e120372f017dddfe6a32c38536d3ff4b3b943c83fd0c70f448868c0afd0

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks