General

  • Target

    H656_Payment_receipt_Pdf.js

  • Size

    300.0MB

  • Sample

    230323-pnsq4sff23

  • MD5

    606730f4cf8cb008adb76fe44b85d6dd

  • SHA1

    84a3a53eab776e4efc24b2149b262e4bbd3c1d6b

  • SHA256

    383161ff3e03ff39f396725cef6bae622040bcd5aff25df8b147c1fd9639daef

  • SHA512

    e5bfd75ec3993672c893bdd456dbd5839a392425ee8c5d802f87f4e5fb23ee24b4c9027c1818f2f4ca6f2667c1f1658b15b7f8bdbbb4aa21eedbb1dfb5c5e6df

  • SSDEEP

    192:EZYg0luzi75WbAZvD1hdh12cB5kw94tMa3dZYkVdPrv1kc8KuIVLk5/lWWWnazhC:EZfz5Khy24jHuHFqWWsW8WHKSqm7S

Malware Config

Extracted

Family

vjw0rm

C2

http://js9300.duckdns.org:9300

Targets

    • Target

      H656_Payment_receipt_Pdf.js

    • Size

      300.0MB

    • MD5

      606730f4cf8cb008adb76fe44b85d6dd

    • SHA1

      84a3a53eab776e4efc24b2149b262e4bbd3c1d6b

    • SHA256

      383161ff3e03ff39f396725cef6bae622040bcd5aff25df8b147c1fd9639daef

    • SHA512

      e5bfd75ec3993672c893bdd456dbd5839a392425ee8c5d802f87f4e5fb23ee24b4c9027c1818f2f4ca6f2667c1f1658b15b7f8bdbbb4aa21eedbb1dfb5c5e6df

    • SSDEEP

      192:EZYg0luzi75WbAZvD1hdh12cB5kw94tMa3dZYkVdPrv1kc8KuIVLk5/lWWWnazhC:EZfz5Khy24jHuHFqWWsW8WHKSqm7S

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks