General

  • Target

    Jsreceipt0193617_PDF.HTML

  • Size

    103B

  • Sample

    230629-2pcgqsfd55

  • MD5

    c349aed7796c6cf3784b423f7a348429

  • SHA1

    1f9f048f524a83ad569e0df65b709bc1de4f344f

  • SHA256

    07176693f0658bb82e3408ef1e85a545b039acf315749ce888dfce55252696cc

  • SHA512

    f505e8dfd29079f11b817204334e65a6c307e6bed8d5a04a7a95fef32bf4031040ef7830b7f039f596c904a489de2887d0903016204e1e78b9715126ccb1e455

Malware Config

Extracted

Family

vjw0rm

C2

http://jsnew9400.duckdns.org:9400

Targets

    • Target

      Jsreceipt0193617_PDF.HTML

    • Size

      103B

    • MD5

      c349aed7796c6cf3784b423f7a348429

    • SHA1

      1f9f048f524a83ad569e0df65b709bc1de4f344f

    • SHA256

      07176693f0658bb82e3408ef1e85a545b039acf315749ce888dfce55252696cc

    • SHA512

      f505e8dfd29079f11b817204334e65a6c307e6bed8d5a04a7a95fef32bf4031040ef7830b7f039f596c904a489de2887d0903016204e1e78b9715126ccb1e455

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks