General

  • Target

    TrackingLabel.js

  • Size

    2.7MB

  • Sample

    230629-waytjaed67

  • MD5

    19c5045d74bd6d55551c00910f44e3cb

  • SHA1

    fa656d4789cc9f0ec6e3cd211b90eda57302c3ef

  • SHA256

    1ee08a9037a820ccadbc782796577fb8581c0003d3f53201510fded41788ddd1

  • SHA512

    516771d1bc03cfc404d99681472f2cd09c88ebc71c00c083923807154e257d4aca087d7ab9f05a74152259199223de1b2458af0e5aff0a9aea44f86c7fda0433

  • SSDEEP

    24576:QoquCbsNf3EdHLEZ8JUvJbXAGetdw8Rwzgys8Pam8Ve7Ylvi+A:AA

Malware Config

Extracted

Family

vjw0rm

C2

http://jemyy.theworkpc.com:5401

Targets

    • Target

      TrackingLabel.js

    • Size

      2.7MB

    • MD5

      19c5045d74bd6d55551c00910f44e3cb

    • SHA1

      fa656d4789cc9f0ec6e3cd211b90eda57302c3ef

    • SHA256

      1ee08a9037a820ccadbc782796577fb8581c0003d3f53201510fded41788ddd1

    • SHA512

      516771d1bc03cfc404d99681472f2cd09c88ebc71c00c083923807154e257d4aca087d7ab9f05a74152259199223de1b2458af0e5aff0a9aea44f86c7fda0433

    • SSDEEP

      24576:QoquCbsNf3EdHLEZ8JUvJbXAGetdw8Rwzgys8Pam8Ve7Ylvi+A:AA

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • WSHRAT

      WSHRAT is a variant of Houdini worm and has vbs and js variants.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks