General

  • Target

    43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd.js

  • Size

    101KB

  • Sample

    240424-bqjpbsde8s

  • MD5

    e55375df88bf966f94390291cbf23a4a

  • SHA1

    541be41c314dbc0ef00f5fc43b60d473803a4d4b

  • SHA256

    43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd

  • SHA512

    6504b4d7912f28a738150f89e4523cab730276011cfca9401b1f940a05e7207a22d34c2c3103c7463cdbda8334fe2822b0085f51f7881142dafa26ae519b45f7

  • SSDEEP

    3072:FRQvg9BY85CWYRoI2jRQvg9BY85CWYRoI2I:FRQv0q85CWYRz2jRQv0q85CWYRz2I

Malware Config

Extracted

Family

vjw0rm

C2

http://vjwmaster.duckdns.org:9987

Targets

    • Target

      43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd.js

    • Size

      101KB

    • MD5

      e55375df88bf966f94390291cbf23a4a

    • SHA1

      541be41c314dbc0ef00f5fc43b60d473803a4d4b

    • SHA256

      43d7fa52f4e690c362da25aac8b4c8feb5620ee8dc6cf21bb2e998e9297abcbd

    • SHA512

      6504b4d7912f28a738150f89e4523cab730276011cfca9401b1f940a05e7207a22d34c2c3103c7463cdbda8334fe2822b0085f51f7881142dafa26ae519b45f7

    • SSDEEP

      3072:FRQvg9BY85CWYRoI2jRQvg9BY85CWYRoI2I:FRQv0q85CWYRz2jRQv0q85CWYRz2I

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks