General

  • Target

    PURCHASE_ORDER.js

  • Size

    16KB

  • Sample

    240328-jvjh5ade73

  • MD5

    5173d26d1ad641d21a4e46578c8ce893

  • SHA1

    93fa6b081e5ef1b262b2497be0ec7ec8be766c20

  • SHA256

    e8c22513e962d944212a2570a29a43fd2e6e90d74913f5db2b5f11443504db1d

  • SHA512

    8df3b7d0c5b41675eaae029688c1cf964d58b66c558e16a528d143c3559d60dfcf4da5c44cb7b112a9123e7dc49e460e99cf862f6b743e1691804f78b89b349c

  • SSDEEP

    192:P42HOwZ0qshWZ7Va6uadY7Va630PpMx2GjdJZu8HheVkiVUT:P42HO+0ApuPEP+28M8HheWz

Malware Config

Targets

    • Target

      PURCHASE_ORDER.js

    • Size

      16KB

    • MD5

      5173d26d1ad641d21a4e46578c8ce893

    • SHA1

      93fa6b081e5ef1b262b2497be0ec7ec8be766c20

    • SHA256

      e8c22513e962d944212a2570a29a43fd2e6e90d74913f5db2b5f11443504db1d

    • SHA512

      8df3b7d0c5b41675eaae029688c1cf964d58b66c558e16a528d143c3559d60dfcf4da5c44cb7b112a9123e7dc49e460e99cf862f6b743e1691804f78b89b349c

    • SSDEEP

      192:P42HOwZ0qshWZ7Va6uadY7Va630PpMx2GjdJZu8HheVkiVUT:P42HO+0ApuPEP+28M8HheWz

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks