General

  • Target

    details.pdf.js

  • Size

    70KB

  • Sample

    220613-cjzbwadcal

  • MD5

    bbc862ee69bf82da669deb71ded427b7

  • SHA1

    c91cc5cef2792186cc6797157b2657bb9ecb5106

  • SHA256

    7164075256d5cc23ca0ac02dbdac0508bbd8e0300201338f80c46a6166af262b

  • SHA512

    207c8bf7dbbf6565a350fa287ac586a00e82547e309e51c7201595119ad0528ffb4bf677ffcb13f60b219edf1b606605e7b73b6aa47d992f891bd55f84717c34

Score
10/10

Malware Config

Extracted

Family

vjw0rm

C2

http://vjworks.ddns.net:7070

Targets

    • Target

      details.pdf.js

    • Size

      70KB

    • MD5

      bbc862ee69bf82da669deb71ded427b7

    • SHA1

      c91cc5cef2792186cc6797157b2657bb9ecb5106

    • SHA256

      7164075256d5cc23ca0ac02dbdac0508bbd8e0300201338f80c46a6166af262b

    • SHA512

      207c8bf7dbbf6565a350fa287ac586a00e82547e309e51c7201595119ad0528ffb4bf677ffcb13f60b219edf1b606605e7b73b6aa47d992f891bd55f84717c34

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks