General

  • Target

    AWB#75698789.pdf.js

  • Size

    260KB

  • Sample

    221223-v8wamaca7x

  • MD5

    ec87b49270ad1afb170890fc4644bd59

  • SHA1

    997f47e7d0bd7bc4ba59c2b737c0b5e108858b62

  • SHA256

    cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3

  • SHA512

    2daa9b36563380a3d55f2a0ec8ddbd1b8fe5d045acb9b98fb210af0e861ed523adef67ee791680e9a9608733e89ba274507ed2405ac9191f62e01f709f19162f

  • SSDEEP

    6144:EPP/pyxHpiGSxCXJZTv+jCtMX1/MJIUDKi:EPHpyR17r+jCtMl/kD9

Malware Config

Targets

    • Target

      AWB#75698789.pdf.js

    • Size

      260KB

    • MD5

      ec87b49270ad1afb170890fc4644bd59

    • SHA1

      997f47e7d0bd7bc4ba59c2b737c0b5e108858b62

    • SHA256

      cd6b788372fc6c577a7f0de514ee7a4ed42da59b866581ddeb0e6c38228428d3

    • SHA512

      2daa9b36563380a3d55f2a0ec8ddbd1b8fe5d045acb9b98fb210af0e861ed523adef67ee791680e9a9608733e89ba274507ed2405ac9191f62e01f709f19162f

    • SSDEEP

      6144:EPP/pyxHpiGSxCXJZTv+jCtMX1/MJIUDKi:EPHpyR17r+jCtMl/kD9

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks