General

  • Target

    Shipping Document PL&BL Draft.js

  • Size

    375KB

  • Sample

    220624-kkwalsdhf6

  • MD5

    ac65f796eeb20e70fd185fad624636f4

  • SHA1

    c1e2bca904cb7a6e3300a34d279894f5f9a016eb

  • SHA256

    3bf7f9438212e92917ba612befda26145945e04245e5dd738919661580a9fb1a

  • SHA512

    fb9e46e1181d95dc488a192eef08dde2b13d65bbd8c2742af37004a4abf9192d66af86ca50e04ec0f5d0a49178d259eedb02344f3680214faa7020a656ec5378

Malware Config

Targets

    • Target

      Shipping Document PL&BL Draft.js

    • Size

      375KB

    • MD5

      ac65f796eeb20e70fd185fad624636f4

    • SHA1

      c1e2bca904cb7a6e3300a34d279894f5f9a016eb

    • SHA256

      3bf7f9438212e92917ba612befda26145945e04245e5dd738919661580a9fb1a

    • SHA512

      fb9e46e1181d95dc488a192eef08dde2b13d65bbd8c2742af37004a4abf9192d66af86ca50e04ec0f5d0a49178d259eedb02344f3680214faa7020a656ec5378

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks