General

  • Target

    0ad3fdd56e17e277a5b3e63f3340977ba5810d030dce4578c523614a914f5dfd

  • Size

    1KB

  • Sample

    220317-b8cczaaca8

  • MD5

    55f6fc77fe92a071e6f034cf14cd4995

  • SHA1

    83be4e551c97e5d11f40f6a09fb83cb387cb9c35

  • SHA256

    0ad3fdd56e17e277a5b3e63f3340977ba5810d030dce4578c523614a914f5dfd

  • SHA512

    491106978efad966814ec0f9d6c14d7c11d989aa2470810881d77bc6bf5bc84bb05de0772aa44cdb7924546e25813a55d71be2c488c220434f5a8ec28198f75d

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://34.105.85.231/DODO/SecurityHealth.exe

exe.dropper

http://34.105.85.231/DODO/SecurityHealth.exe.manifest

Extracted

Family

vjw0rm

C2

http://help-microsoft.dnslive.net:1166

Targets

    • Target

      0ad3fdd56e17e277a5b3e63f3340977ba5810d030dce4578c523614a914f5dfd

    • Size

      1KB

    • MD5

      55f6fc77fe92a071e6f034cf14cd4995

    • SHA1

      83be4e551c97e5d11f40f6a09fb83cb387cb9c35

    • SHA256

      0ad3fdd56e17e277a5b3e63f3340977ba5810d030dce4578c523614a914f5dfd

    • SHA512

      491106978efad966814ec0f9d6c14d7c11d989aa2470810881d77bc6bf5bc84bb05de0772aa44cdb7924546e25813a55d71be2c488c220434f5a8ec28198f75d

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks