General

  • Target

    SOA and invoices.js

  • Size

    4.4MB

  • Sample

    230208-xbvnyade9x

  • MD5

    08ec6390255e658106aac7aae7114b6c

  • SHA1

    b8f85e4daf4461f6ee5c69ff95bc51c24b33fff0

  • SHA256

    64394d6cb0b1ac69cddc943ae96e755184d20a60428372e24e0df466c2debfa9

  • SHA512

    b1834040f984b200b3686cb97d846ecc894bd1af3fd06bc21de00cd0613d3ad9b85f780b6b5b5a4d1345ade5a1acdb36b13f55e803b654eb576e980cce534152

  • SSDEEP

    24576:rDg0p0xod7eN0L23S6z4/WBXVFbPUzgvQ/vZSoKJ6hU:18N0IZTBnbPe1KJ6hU

Score
10/10

Malware Config

Targets

    • Target

      SOA and invoices.js

    • Size

      4.4MB

    • MD5

      08ec6390255e658106aac7aae7114b6c

    • SHA1

      b8f85e4daf4461f6ee5c69ff95bc51c24b33fff0

    • SHA256

      64394d6cb0b1ac69cddc943ae96e755184d20a60428372e24e0df466c2debfa9

    • SHA512

      b1834040f984b200b3686cb97d846ecc894bd1af3fd06bc21de00cd0613d3ad9b85f780b6b5b5a4d1345ade5a1acdb36b13f55e803b654eb576e980cce534152

    • SSDEEP

      24576:rDg0p0xod7eN0L23S6z4/WBXVFbPUzgvQ/vZSoKJ6hU:18N0IZTBnbPe1KJ6hU

    Score
    10/10
    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks