General

  • Target

    java.js

  • Size

    504KB

  • Sample

    240207-jad3xafffk

  • MD5

    f9a2f407e3a96b98798ead405013535c

  • SHA1

    085a55fc5e128fe2e18aa4d17c4762bf86b051a2

  • SHA256

    c76700dd7e3de8aabaa19309caa7a1b83f3a175778d1b374315cdb362d4f7b50

  • SHA512

    f3c9d87e502a94492968ba5ca1f427f63e10ce137da773d5dc53376c9fcf907cbb4895c9150768a18a86fb6fb7a45e753c331e86ca24b94758a057f9758be332

  • SSDEEP

    3072:U2I4IZk8bw+bDtRVP2QmYNWXo9phTMQ6EHqTNehzVqtSdbL6x7h2H+kzV4mWeOD0:U2I4IZkUVP2tYNWXoX/6qqTNeP

Malware Config

Targets

    • Target

      java.js

    • Size

      504KB

    • MD5

      f9a2f407e3a96b98798ead405013535c

    • SHA1

      085a55fc5e128fe2e18aa4d17c4762bf86b051a2

    • SHA256

      c76700dd7e3de8aabaa19309caa7a1b83f3a175778d1b374315cdb362d4f7b50

    • SHA512

      f3c9d87e502a94492968ba5ca1f427f63e10ce137da773d5dc53376c9fcf907cbb4895c9150768a18a86fb6fb7a45e753c331e86ca24b94758a057f9758be332

    • SSDEEP

      3072:U2I4IZk8bw+bDtRVP2QmYNWXo9phTMQ6EHqTNehzVqtSdbL6x7h2H+kzV4mWeOD0:U2I4IZkUVP2tYNWXoX/6qqTNeP

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks