General

  • Target

    PO.230029.js

  • Size

    3.5MB

  • Sample

    230215-shbgescb6s

  • MD5

    2760f9a45e9e74c4eedfe9b0ee918e6b

  • SHA1

    277c62b14c987da3cf4c9e7d4ee4478cf61580c7

  • SHA256

    18827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482

  • SHA512

    45aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e

  • SSDEEP

    6144:nDKcCNX9cMH0svW5he7NbWSRU9qB02HkyjM6P:nDupdf

Malware Config

Targets

    • Target

      PO.230029.js

    • Size

      3.5MB

    • MD5

      2760f9a45e9e74c4eedfe9b0ee918e6b

    • SHA1

      277c62b14c987da3cf4c9e7d4ee4478cf61580c7

    • SHA256

      18827fed6ecd5e4d2c548dcad1eb21730a95f52b578bed75e3003b06a7390482

    • SHA512

      45aa5c7a51f644e82fc436029187fef542ee9a3be80ed8c3535c0383c938509f4d3f4414c97328430092bec1eed5a5105d47f45f36664f49c63a146b12a9fb7e

    • SSDEEP

      6144:nDKcCNX9cMH0svW5he7NbWSRU9qB02HkyjM6P:nDupdf

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks