General

  • Target

    Electroinc receipt #170622-HWRM-AMZN.js

  • Size

    50KB

  • Sample

    220616-he8bwafcdq

  • MD5

    b4ff9e813c3c7f228605b07932bfbe86

  • SHA1

    3ef44f9fec10cd94d2cd5c71799d79ef103a2e1a

  • SHA256

    abd35915269d9b7031f7a74be2827e2e5591734f41e0e0da9ea42f9654f79dfa

  • SHA512

    e3114ae026e9e540ecaaf3dcba1a2de23c017443dcfe874da57f2b04dcdd7d660ce6b81732665aecec717966932be3c7992ac27b42be803bdbb999a2308ba1ba

Malware Config

Targets

    • Target

      Electroinc receipt #170622-HWRM-AMZN.js

    • Size

      50KB

    • MD5

      b4ff9e813c3c7f228605b07932bfbe86

    • SHA1

      3ef44f9fec10cd94d2cd5c71799d79ef103a2e1a

    • SHA256

      abd35915269d9b7031f7a74be2827e2e5591734f41e0e0da9ea42f9654f79dfa

    • SHA512

      e3114ae026e9e540ecaaf3dcba1a2de23c017443dcfe874da57f2b04dcdd7d660ce6b81732665aecec717966932be3c7992ac27b42be803bdbb999a2308ba1ba

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks