General

  • Target

    T817630494847_Payment_receipt_Pdf.js

  • Size

    2.0MB

  • Sample

    230223-lhds8ahc4t

  • MD5

    f8a9117d4c4217fd4cbab1da6d3359b6

  • SHA1

    f3ea387aeaf9e587d135d797e0468904328c291a

  • SHA256

    db99c6255bfd1d06c6a103e4602715c069039c140389d33d2909912e1b58158d

  • SHA512

    232eb1d882feac675994d192436254521b42a2b1d2ae32f6c5cd8618ae29d619a26ad9672f6644a62abfd484a1b0e76f69003d40f79a14cc200be4b124d0bea6

  • SSDEEP

    192:aZVhB3qe3Ju2l2ZUCz1ZNWDl01tHY8T0:cVHaLRZcmXpg

Malware Config

Extracted

Family

vjw0rm

C2

http://js9300.duckdns.org:9300

Targets

    • Target

      T817630494847_Payment_receipt_Pdf.js

    • Size

      2.0MB

    • MD5

      f8a9117d4c4217fd4cbab1da6d3359b6

    • SHA1

      f3ea387aeaf9e587d135d797e0468904328c291a

    • SHA256

      db99c6255bfd1d06c6a103e4602715c069039c140389d33d2909912e1b58158d

    • SHA512

      232eb1d882feac675994d192436254521b42a2b1d2ae32f6c5cd8618ae29d619a26ad9672f6644a62abfd484a1b0e76f69003d40f79a14cc200be4b124d0bea6

    • SSDEEP

      192:aZVhB3qe3Ju2l2ZUCz1ZNWDl01tHY8T0:cVHaLRZcmXpg

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks