General

  • Target

    Statement-Invoice.js

  • Size

    10KB

  • Sample

    220708-1bgc4ahfal

  • MD5

    c94c70544e1792362319f444ff1969ba

  • SHA1

    0b8712b610744c9bf0cb469662f7823ed71e84b9

  • SHA256

    9296cb6b37e1aa570675bcc07519b5887d20ec6617efa84d900286a8a829c994

  • SHA512

    001eb00bf2851c8cda1bbf2ccb9a7d624378896d6a8cce02e99af4e0c7c2751d2cbc496c3c98d0f0535d1c0413e06c5a72b542f7d4b5e2f2c78b4ac5b04a1512

Malware Config

Extracted

Family

vjw0rm

C2

http://hwprocessing.duckdns.org:9933

Targets

    • Target

      Statement-Invoice.js

    • Size

      10KB

    • MD5

      c94c70544e1792362319f444ff1969ba

    • SHA1

      0b8712b610744c9bf0cb469662f7823ed71e84b9

    • SHA256

      9296cb6b37e1aa570675bcc07519b5887d20ec6617efa84d900286a8a829c994

    • SHA512

      001eb00bf2851c8cda1bbf2ccb9a7d624378896d6a8cce02e99af4e0c7c2751d2cbc496c3c98d0f0535d1c0413e06c5a72b542f7d4b5e2f2c78b4ac5b04a1512

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks