General

  • Target

    Transfer_receipt_jpg.js

  • Size

    29KB

  • Sample

    220707-gbedysdheq

  • MD5

    5333fab02eabde7a8e9c0d8a0b838237

  • SHA1

    9ac71fd8fa80f40f88a1b4e9e8800db9e8c579fe

  • SHA256

    f6cf2d7c500799688ffa713b0a82e8d5625ce73dc0c16ab0aecc6bdf20b38458

  • SHA512

    3693afd65f6c1e578f35bacd9aa894a77fef91202d5a1542f95e40b7d250b953adc737a378f4bff98604b9ad50d32b6da95039ad004ee46bae6f6522b1b14f16

Score
10/10

Malware Config

Targets

    • Target

      Transfer_receipt_jpg.js

    • Size

      29KB

    • MD5

      5333fab02eabde7a8e9c0d8a0b838237

    • SHA1

      9ac71fd8fa80f40f88a1b4e9e8800db9e8c579fe

    • SHA256

      f6cf2d7c500799688ffa713b0a82e8d5625ce73dc0c16ab0aecc6bdf20b38458

    • SHA512

      3693afd65f6c1e578f35bacd9aa894a77fef91202d5a1542f95e40b7d250b953adc737a378f4bff98604b9ad50d32b6da95039ad004ee46bae6f6522b1b14f16

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks