General
-
Target
TG216_94_312_PDF.js
-
Size
97KB
-
Sample
230202-nr9ncsga32
-
MD5
7afbb2051c1ba1c1e88c499c5e11636a
-
SHA1
4b2a14b3ca310b1f39959c130ae7b72a03078873
-
SHA256
74fc83dc153086db0329b982e73e8bee4b652d1265c8185b0b4374898a112d06
-
SHA512
c506d2d13383948d9acfafdc152f81326fc73381530fbb019794f9bc2b7733b3b455f6eddc92d597614f0f6d641f391d737f93f809486707cb1d8f84378309ec
-
SSDEEP
384:chWWz5Kfy24jHueR45qWWxWBWHKSqmqR4G:XYG
Static task
static1
Behavioral task
behavioral1
Sample
TG216_94_312_PDF.js
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TG216_94_312_PDF.js
Resource
win10v2004-20221111-en
Malware Config
Extracted
vjw0rm
http://js9400.duckdns.org:9400
Targets
-
-
Target
TG216_94_312_PDF.js
-
Size
97KB
-
MD5
7afbb2051c1ba1c1e88c499c5e11636a
-
SHA1
4b2a14b3ca310b1f39959c130ae7b72a03078873
-
SHA256
74fc83dc153086db0329b982e73e8bee4b652d1265c8185b0b4374898a112d06
-
SHA512
c506d2d13383948d9acfafdc152f81326fc73381530fbb019794f9bc2b7733b3b455f6eddc92d597614f0f6d641f391d737f93f809486707cb1d8f84378309ec
-
SSDEEP
384:chWWz5Kfy24jHueR45qWWxWBWHKSqmqR4G:XYG
Score10/10-
Blocklisted process makes network request
-
Drops startup file
-
Adds Run key to start application
-
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation