General

  • Target

    35K MT SOYBEAN MEAL.js

  • Size

    1.4MB

  • Sample

    230112-s5xm6scc31

  • MD5

    520428e8d0eb089f381439c7877482a8

  • SHA1

    4ece1f572b9e1eeff87287938198f7e75d99eda0

  • SHA256

    ceaa4d371a7d05ee9dc926777f30684b0acd7ea78c745a8d1b3eaa77b6e85e55

  • SHA512

    76ccd734760ff90ef8abfc2ebf36fb67d4924091a9a8fd626ad9722bd2fb42ab5b5a199a2e8baeac898eaba636b8e1a269c06c5f3d4813d4cd3b38e980ceda0b

  • SSDEEP

    12288:E0PM6alqrN4P5/TJVnNRVRuCVPWYZYryTmp9V8wFfrPTKR4NVyqxSuogqmNx2plw:9IlqK1TJVP/VPWMYkwFfrmHqxLx1l3Hh

Malware Config

Targets

    • Target

      35K MT SOYBEAN MEAL.js

    • Size

      1.4MB

    • MD5

      520428e8d0eb089f381439c7877482a8

    • SHA1

      4ece1f572b9e1eeff87287938198f7e75d99eda0

    • SHA256

      ceaa4d371a7d05ee9dc926777f30684b0acd7ea78c745a8d1b3eaa77b6e85e55

    • SHA512

      76ccd734760ff90ef8abfc2ebf36fb67d4924091a9a8fd626ad9722bd2fb42ab5b5a199a2e8baeac898eaba636b8e1a269c06c5f3d4813d4cd3b38e980ceda0b

    • SSDEEP

      12288:E0PM6alqrN4P5/TJVnNRVRuCVPWYZYryTmp9V8wFfrPTKR4NVyqxSuogqmNx2plw:9IlqK1TJVP/VPWMYkwFfrmHqxLx1l3Hh

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Command and Control

Web Service

1
T1102

Tasks