General

  • Target

    New_Order.js

  • Size

    121KB

  • Sample

    220613-smnybadca4

  • MD5

    10618f9206270556b21eed02cff7efb6

  • SHA1

    997c8dcde0cbc67164212dc9091e2971620511a9

  • SHA256

    b908d37c8fd6804048f23376159e0610b48b0bc3dda2ba4876d69da4fbed4d77

  • SHA512

    de363de443370113bb2d41249d707321dd066cbd15b4f17589924a255815a9618d2ee8cc617b85d8103415b60654c89546f549efb7283d984714571cdea56f22

Malware Config

Extracted

Family

vjw0rm

C2

http://franmhort.duia.ro:8152

Targets

    • Target

      New_Order.js

    • Size

      121KB

    • MD5

      10618f9206270556b21eed02cff7efb6

    • SHA1

      997c8dcde0cbc67164212dc9091e2971620511a9

    • SHA256

      b908d37c8fd6804048f23376159e0610b48b0bc3dda2ba4876d69da4fbed4d77

    • SHA512

      de363de443370113bb2d41249d707321dd066cbd15b4f17589924a255815a9618d2ee8cc617b85d8103415b60654c89546f549efb7283d984714571cdea56f22

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

      suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

    • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

      suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks