General

  • Target

    upsver.js

  • Size

    99KB

  • Sample

    230227-1bx1vafe8x

  • MD5

    cf8263bd95c97a1b5e3932134a9172c5

  • SHA1

    a9b0e170b17e8236b7e55c9399411ef173422737

  • SHA256

    3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7

  • SHA512

    c59b797ff20cd94769db06012187d0f54ca8701c3a4bd92ed1661242311e29e6d6ea14fac65fb2607646ab577ef1d5f6351e105a0aa64d3039604d8bbef69ead

  • SSDEEP

    192:nluzi75WbAZvs1hdh12cB5kw94tMa3dZYkVdPrv1kc4uIVLk5/lWWWnazewBB5je:cz5Kyy24jHuMqWWyB1KSqmjm

Malware Config

Extracted

Family

vjw0rm

C2

http://66.154.102.135:9909

Targets

    • Target

      upsver.js

    • Size

      99KB

    • MD5

      cf8263bd95c97a1b5e3932134a9172c5

    • SHA1

      a9b0e170b17e8236b7e55c9399411ef173422737

    • SHA256

      3e61b1cfc096af4b8b8371daaf4f233af9d00286232d16159b3ce77a17f3dba7

    • SHA512

      c59b797ff20cd94769db06012187d0f54ca8701c3a4bd92ed1661242311e29e6d6ea14fac65fb2607646ab577ef1d5f6351e105a0aa64d3039604d8bbef69ead

    • SSDEEP

      192:nluzi75WbAZvs1hdh12cB5kw94tMa3dZYkVdPrv1kc4uIVLk5/lWWWnazewBB5je:cz5Kyy24jHuMqWWyB1KSqmjm

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks