General

  • Target

    Spécifications de la commande.zip

  • Size

    18KB

  • Sample

    230721-qnnmtseh28

  • MD5

    7071340bb289d8b9e9c4487aa5f97391

  • SHA1

    f9b3458b6ef9e2b52467de8ddf5580cfee6af92a

  • SHA256

    6b2b1415c898b1c1770ba62a1ecfb870a626a47d3f72811f803c2ec651808b71

  • SHA512

    dedd833d46d02cbc088e1ff8c9272b32e72b75d3199a286df49110ffc26c114272aac412a06786f441187db32d225f349c398b5e73dbbf8dfb6514f340b2b19c

  • SSDEEP

    384:NSritTwvlIzSyaT7TnyTAwZrqdCvRJ0mQTxWRIwpgeV0ajgyWpwXIRPbB:RtCSSya7TIA+rqdCJPQxHeZMuXK

Malware Config

Extracted

Family

vjw0rm

C2

http://severdops.ddns.net:5050

Targets

    • Target

      Spécifications de la commande.js

    • Size

      26KB

    • MD5

      890730ddebf9affaebc94bd26ca5ba14

    • SHA1

      184fd52a0525b68c964f2b1c68fc7ed0f93a41b2

    • SHA256

      822b0e065dd9e5bb4441ab4e7641f73e34d240272b2c664141d07abdd0ed7f2d

    • SHA512

      77220a8c9c38a2fd5bf31243e52ea9eb50429cd2554b7709d19beae64076208b10bdb9e4e76cee2a931a871a763a5a7a7b4adefb18c7eaeac7b38fc1e7c6476a

    • SSDEEP

      768:LqWqIHKOv52EIhyW3ub2SlnnPYEJr8sv/hFXpMkdDkyO:LqWzHB5GhbuqSlnwj+JppMcIyO

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks