General

  • Target

    receipt.js

  • Size

    166KB

  • Sample

    220622-jevapaafbj

  • MD5

    3a6e3a42eda0c68307e16774cdb155c1

  • SHA1

    1d72fb4eade35e91e7ced538e6b09a0860fb44a2

  • SHA256

    ae6fd665d99775c8880d301acec3edc28e44cf7e39338c5474533bb39dc3389c

  • SHA512

    5414eab172dcdf89f80153e1fae756f5b3bd7c6df410980040f158b083a875e530b6791af3157b0cb1648102ff247e9c5c0d357d4004230a70bfb26c4b4a55b3

Malware Config

Extracted

Family

vjw0rm

C2

http://zeegod.duckdns.org:9003

Targets

    • Target

      receipt.js

    • Size

      166KB

    • MD5

      3a6e3a42eda0c68307e16774cdb155c1

    • SHA1

      1d72fb4eade35e91e7ced538e6b09a0860fb44a2

    • SHA256

      ae6fd665d99775c8880d301acec3edc28e44cf7e39338c5474533bb39dc3389c

    • SHA512

      5414eab172dcdf89f80153e1fae756f5b3bd7c6df410980040f158b083a875e530b6791af3157b0cb1648102ff247e9c5c0d357d4004230a70bfb26c4b4a55b3

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks