General

  • Target

    d534da11-be41-4c1b-ab00-ddcf7bc442d0.js

  • Size

    1.4MB

  • Sample

    230117-1zc1ksgh48

  • MD5

    29bd036b564280a0e9b876ece0c39e95

  • SHA1

    010441ddb171de2e865a185f45d9973f62c01294

  • SHA256

    26c461c102538e0758dbc3f003850cf7c30760ff2d180dab4759f34e2cd951a1

  • SHA512

    96c7624210db1403cded45418c671ab368f6c2aa90837551a9fd9f6de4110d319482c56f715e438d16f3e1ef305d71819363bd8ce9e2c034f7b032ab4c222c1d

  • SSDEEP

    24576:VFDNjSzh3ZleO8du2Ih8XNn1ixHoZIK9zF2zbYeXGA93Uz:LDNjSN3b7b2Ih891ZT9JNAu

Malware Config

Targets

    • Target

      d534da11-be41-4c1b-ab00-ddcf7bc442d0.js

    • Size

      1.4MB

    • MD5

      29bd036b564280a0e9b876ece0c39e95

    • SHA1

      010441ddb171de2e865a185f45d9973f62c01294

    • SHA256

      26c461c102538e0758dbc3f003850cf7c30760ff2d180dab4759f34e2cd951a1

    • SHA512

      96c7624210db1403cded45418c671ab368f6c2aa90837551a9fd9f6de4110d319482c56f715e438d16f3e1ef305d71819363bd8ce9e2c034f7b032ab4c222c1d

    • SSDEEP

      24576:VFDNjSzh3ZleO8du2Ih8XNn1ixHoZIK9zF2zbYeXGA93Uz:LDNjSN3b7b2Ih891ZT9JNAu

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks