General

  • Target

    Receipt.js

  • Size

    3KB

  • Sample

    230308-hd1kmsed55

  • MD5

    b226987db14d44762e9ebefcda95e144

  • SHA1

    d86eac68820c39703e52142d3bf450525a9f8d6c

  • SHA256

    6de643d185952a9903ab06d382c4373e516329536734d90be309004afaa5ea50

  • SHA512

    c937e645be893774627bb9849c043f0ce0f9a35b39e843d2489124eaafe650ad55002dc90d1df68e6815950fb8f197a3cee73282eea19b2a701600aaba7775f2

Malware Config

Extracted

Family

vjw0rm

C2

http://ourvjworm.duckdns.org:7974

Targets

    • Target

      Receipt.js

    • Size

      3KB

    • MD5

      b226987db14d44762e9ebefcda95e144

    • SHA1

      d86eac68820c39703e52142d3bf450525a9f8d6c

    • SHA256

      6de643d185952a9903ab06d382c4373e516329536734d90be309004afaa5ea50

    • SHA512

      c937e645be893774627bb9849c043f0ce0f9a35b39e843d2489124eaafe650ad55002dc90d1df68e6815950fb8f197a3cee73282eea19b2a701600aaba7775f2

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks