General

  • Target

    Confirmation transfer Copy MT103 Ref-101019906.js

  • Size

    353KB

  • Sample

    220907-m2tt8abha6

  • MD5

    3e4abaeae68b400b3bb636286f0aafa7

  • SHA1

    46aeb3dada4871e84cb7eeed98e9e94e10ceab3b

  • SHA256

    34de6de1c42174a1529b1e2920c51b1efa300fff48902e5a8a3836817e12c25b

  • SHA512

    28e6ef967408193b99d4ce4faa8f15fb334ffbe178156d4ba2e7f7849b57a6fe5d82c34bce7e8ea56997a076931d36792793948f6ccbeef1f97f82616996a959

  • SSDEEP

    6144:tC5Lz6L8qNMaXlcWa+syZ3hL0sG6ZPmY4JGrx01gqyvCKaT80S2gGxC:tCtHa1cvVihL7GUSGKgzaRY0S2JxC

Malware Config

Targets

    • Target

      Confirmation transfer Copy MT103 Ref-101019906.js

    • Size

      353KB

    • MD5

      3e4abaeae68b400b3bb636286f0aafa7

    • SHA1

      46aeb3dada4871e84cb7eeed98e9e94e10ceab3b

    • SHA256

      34de6de1c42174a1529b1e2920c51b1efa300fff48902e5a8a3836817e12c25b

    • SHA512

      28e6ef967408193b99d4ce4faa8f15fb334ffbe178156d4ba2e7f7849b57a6fe5d82c34bce7e8ea56997a076931d36792793948f6ccbeef1f97f82616996a959

    • SSDEEP

      6144:tC5Lz6L8qNMaXlcWa+syZ3hL0sG6ZPmY4JGrx01gqyvCKaT80S2gGxC:tCtHa1cvVihL7GUSGKgzaRY0S2JxC

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks