General

  • Target

    4272d76e2efed7d323e14bccef987913.bin

  • Size

    17KB

  • Sample

    230724-ccn8bsaa31

  • MD5

    386a8e853ebd5538583f77873b6b8960

  • SHA1

    ce211887582b1954f98eabaf84497c507176c41d

  • SHA256

    483092b7a268b51243e99cdf55f71e30f16edd17fd21f913cabab75811642cf6

  • SHA512

    f68357a8ae503052f98240962c53f637d5508db9d106bd71b49b95e39dfa57df90167d6bf87c0a236f11a0e53e35e68cd84ec61899ae2d05e7303fac1c7332d8

  • SSDEEP

    384:ToCZHqpCzc5WQshLufGezJ7pWp/CDay873Qw22KT6aCpoqvTscDwg:MCQCXLufDlV8jzHaCpoYTsDg

Malware Config

Extracted

Family

vjw0rm

C2

http://severdops.ddns.net:5050

Targets

    • Target

      39372ec10b2720511f8ca94e8aed43273c507637ec03f9a1eac279aadeb22c55.js

    • Size

      24KB

    • MD5

      4272d76e2efed7d323e14bccef987913

    • SHA1

      a8cde379b41cfafb036896484844620a7fcc11c6

    • SHA256

      39372ec10b2720511f8ca94e8aed43273c507637ec03f9a1eac279aadeb22c55

    • SHA512

      717ca100e5f2463b8aa675185e2dbd743a015fffe7654dab2b227691ed66e9443a3e387d31c3eeed63a22d1b3f77b213feec3c3fe6c1438ddf5313066f2583a9

    • SSDEEP

      384:0B+UO8kwlbBtHS0ihYvG3bMZcCOQHp4aIX6xEzWZNxFlumanjjjIYNFLD5zvOJ:09ewl7tGr+Oy4aPOL13IoFLdzGJ

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks