General

  • Target

    js-debloated-1.js

  • Size

    6KB

  • Sample

    230827-pwgntabd5x

  • MD5

    cc6c91ddaed3c86e49ad873972f021a6

  • SHA1

    e48c72c049455ca0d58c7cd4828807cc59b7ce43

  • SHA256

    8a5a47aa6aa42919f05c32ff57036c4d7fc7adf4e6d43a256ad0bde223644504

  • SHA512

    2f9254368b6fa4ee3106ec52350e75f84bbbcc4e6e044c8a9304af6bf16cc98305da80655848134f970542684d017e222d5ae10359e9ade81b21c562689c8052

  • SSDEEP

    192:oZVhRdS232ZSLuXTqwhVScjNYkJ+cDUz8++pZ:qVd5uXTqw3ScZYjPANpZ

Malware Config

Extracted

Family

vjw0rm

C2

http://sundayjs7250.duckdns.org:7250

Targets

    • Target

      js-debloated-1.js

    • Size

      6KB

    • MD5

      cc6c91ddaed3c86e49ad873972f021a6

    • SHA1

      e48c72c049455ca0d58c7cd4828807cc59b7ce43

    • SHA256

      8a5a47aa6aa42919f05c32ff57036c4d7fc7adf4e6d43a256ad0bde223644504

    • SHA512

      2f9254368b6fa4ee3106ec52350e75f84bbbcc4e6e044c8a9304af6bf16cc98305da80655848134f970542684d017e222d5ae10359e9ade81b21c562689c8052

    • SSDEEP

      192:oZVhRdS232ZSLuXTqwhVScjNYkJ+cDUz8++pZ:qVd5uXTqw3ScZYjPANpZ

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks