General

  • Target

    JUclMnXWGX.js

  • Size

    30KB

  • Sample

    220620-lm7l4aecd8

  • MD5

    1a78c6c4ea92442d7da8af8d2557e0d2

  • SHA1

    410764bee9220b5630ac46f7a1c5c36c93b742c9

  • SHA256

    288f91b613ec105cf8d9576e056b6c504c859c842b3b17649d103308040bd82d

  • SHA512

    548c4cd49e8277b49d25d2d4b3ba04a29ba474e0ae1761a8edf12643923a6872e8bc448c05b0003c7bcea44cf1847d82ea7ad89874b6657e41055b89e7d4b20d

Malware Config

Targets

    • Target

      JUclMnXWGX.js

    • Size

      30KB

    • MD5

      1a78c6c4ea92442d7da8af8d2557e0d2

    • SHA1

      410764bee9220b5630ac46f7a1c5c36c93b742c9

    • SHA256

      288f91b613ec105cf8d9576e056b6c504c859c842b3b17649d103308040bd82d

    • SHA512

      548c4cd49e8277b49d25d2d4b3ba04a29ba474e0ae1761a8edf12643923a6872e8bc448c05b0003c7bcea44cf1847d82ea7ad89874b6657e41055b89e7d4b20d

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks