General

  • Target

    Spécifications de la commande.pdf.htm

  • Size

    925KB

  • Sample

    230721-q8cfasfd9w

  • MD5

    f1b536c880fc84bef6f949a3e366c770

  • SHA1

    7866f48ab49c974cc6a88b94c849d032dc77f820

  • SHA256

    b1bc165133fd4e427f9fdef8b03b7402a6fd3511d714d9c2689c00e8c7b1c942

  • SHA512

    3c845069ab133bd81f8177dc29d544014d93463976d69926c187cb44199c55cd5338dff5d7e655cebac1433fcf801ab26469c5c63b4504810970295819f38204

  • SSDEEP

    12288:DtoBM/Qa+c3Ruml/Dh1rQQZLyY9itgyulwzJXQXgs6zE+70itaPGwkq8khKLN3yJ:SBM/R3MshmQ0gyulwrs6zEs9wk1LN3i

Malware Config

Extracted

Family

vjw0rm

C2

http://severdops.ddns.net:5050

Targets

    • Target

      Spécifications de la commande.pdf.htm

    • Size

      925KB

    • MD5

      f1b536c880fc84bef6f949a3e366c770

    • SHA1

      7866f48ab49c974cc6a88b94c849d032dc77f820

    • SHA256

      b1bc165133fd4e427f9fdef8b03b7402a6fd3511d714d9c2689c00e8c7b1c942

    • SHA512

      3c845069ab133bd81f8177dc29d544014d93463976d69926c187cb44199c55cd5338dff5d7e655cebac1433fcf801ab26469c5c63b4504810970295819f38204

    • SSDEEP

      12288:DtoBM/Qa+c3Ruml/Dh1rQQZLyY9itgyulwzJXQXgs6zE+70itaPGwkq8khKLN3yJ:SBM/R3MshmQ0gyulwrs6zEs9wk1LN3i

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks