General
-
Target
Payment Receipt.js
-
Size
330KB
-
Sample
240806-gmf2xs1ejk
-
MD5
95be6aa690cfa33cf39ae04df1f71d10
-
SHA1
c6d9a946176a7b216341387b4acfa01cba1da264
-
SHA256
f4e2003ac6fe30a9b388badeed14ec8b9564446738c7c2313e39e476b7a4023a
-
SHA512
8327287a6c0833d4ef5eb1b3f77c4a89a92d8b642353987af9c8c10d9f8a607d24faf2865578d6f8ceaf6f12a2d8e6571d372e41ac839487f9b6381207800e28
-
SSDEEP
6144:9CgH7TPnDL0svfrbvfTDEkvPrLvPTzWmP/rbP/TDkEPvrLPvTzyCvfrbvfTDEkvT:T
Static task
static1
Behavioral task
behavioral1
Sample
Payment Receipt.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Payment Receipt.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
Extracted
xworm
5.0
lisa22194141.duckdns.org:7000
xyIsniB5c2bg0ZE4
-
install_file
USB.exe
Targets
-
-
Target
Payment Receipt.js
-
Size
330KB
-
MD5
95be6aa690cfa33cf39ae04df1f71d10
-
SHA1
c6d9a946176a7b216341387b4acfa01cba1da264
-
SHA256
f4e2003ac6fe30a9b388badeed14ec8b9564446738c7c2313e39e476b7a4023a
-
SHA512
8327287a6c0833d4ef5eb1b3f77c4a89a92d8b642353987af9c8c10d9f8a607d24faf2865578d6f8ceaf6f12a2d8e6571d372e41ac839487f9b6381207800e28
-
SSDEEP
6144:9CgH7TPnDL0svfrbvfTDEkvPrLvPTzWmP/rbP/TDkEPvrLPvTzyCvfrbvfTDEkvT:T
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-