General

  • Target

    57E10092A0245E6D4D2C2C34100593F38CC6060AEF482.exe

  • Size

    4.2MB

  • Sample

    220310-qjc1jafba6

  • MD5

    d59004727742eb8ba309368611e48019

  • SHA1

    55b2dce59cf019f819a980a4a142383b8a537a06

  • SHA256

    57e10092a0245e6d4d2c2c34100593f38cc6060aef482ca83e676b8715a114af

  • SHA512

    dd0c3b1893ef3b7cb0f9b4e565a8839b072b69ac40137622275885616ab25706a4b3effa6696c94ff9a41ee6cbd7fab5abbaa2ed97a7798ca04bb184be9c52f3

Score
10/10

Malware Config

Targets

    • Target

      57E10092A0245E6D4D2C2C34100593F38CC6060AEF482.exe

    • Size

      4.2MB

    • MD5

      d59004727742eb8ba309368611e48019

    • SHA1

      55b2dce59cf019f819a980a4a142383b8a537a06

    • SHA256

      57e10092a0245e6d4d2c2c34100593f38cc6060aef482ca83e676b8715a114af

    • SHA512

      dd0c3b1893ef3b7cb0f9b4e565a8839b072b69ac40137622275885616ab25706a4b3effa6696c94ff9a41ee6cbd7fab5abbaa2ed97a7798ca04bb184be9c52f3

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks