General

  • Target

    Orders Docs.js

  • Size

    164KB

  • Sample

    220622-se6s6acaf7

  • MD5

    18b9c0bc1c0ee305564334c961f1f17c

  • SHA1

    09ce3403cbb2b5f489529e96997ccffa4db044b1

  • SHA256

    9cafe3e7e089f96852a245f8d24f2c4bc67888e381a3d15607859cdbb7b62897

  • SHA512

    f8a7f77a8912eb17bccd619b711f981875e219db3acdd126d129ad82fe31f6528bac6e034e064094ad526fb7d81e7c7cf0546e52c84f7620a17fc47042e06eed

Malware Config

Extracted

Family

vjw0rm

C2

http://45.138.16.233:1985

Targets

    • Target

      Orders Docs.js

    • Size

      164KB

    • MD5

      18b9c0bc1c0ee305564334c961f1f17c

    • SHA1

      09ce3403cbb2b5f489529e96997ccffa4db044b1

    • SHA256

      9cafe3e7e089f96852a245f8d24f2c4bc67888e381a3d15607859cdbb7b62897

    • SHA512

      f8a7f77a8912eb17bccd619b711f981875e219db3acdd126d129ad82fe31f6528bac6e034e064094ad526fb7d81e7c7cf0546e52c84f7620a17fc47042e06eed

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks