General

  • Target

    RFQ#20220613124723.js

  • Size

    154KB

  • Sample

    220614-jkas8scfhq

  • MD5

    442e76db9f0df9c42516a3c25918ea57

  • SHA1

    e1aba501830bcf0849212fdb16f251432197ad30

  • SHA256

    93a6e905e6ffce29d1898d05f03cbccbbee1d831a65f53abf12febda1d6c4951

  • SHA512

    4ae674415de8cc19149955fd136b1cab32be4a858b48cc069bb52f715ce407bc16699bc9c1d0b267a1f13a8e8934fffdfa7d99afcc68c1bef39b98f09c69c5e0

Malware Config

Targets

    • Target

      RFQ#20220613124723.js

    • Size

      154KB

    • MD5

      442e76db9f0df9c42516a3c25918ea57

    • SHA1

      e1aba501830bcf0849212fdb16f251432197ad30

    • SHA256

      93a6e905e6ffce29d1898d05f03cbccbbee1d831a65f53abf12febda1d6c4951

    • SHA512

      4ae674415de8cc19149955fd136b1cab32be4a858b48cc069bb52f715ce407bc16699bc9c1d0b267a1f13a8e8934fffdfa7d99afcc68c1bef39b98f09c69c5e0

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

      suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm Checkin UA

    • suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

      suricata: ET MALWARE Worm.VBS Dunihi/Houdini/H-Worm/WSHRAT Checkin 1

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks