General
-
Target
375d690a75254f5b58018e443205c6800270e553234845d92378b90023c9dc13.js
-
Size
47.0MB
-
Sample
240808-blcp8a1dpf
-
MD5
e633eaeb161017eec584bd3f042cde07
-
SHA1
6c0181476a703f2cc7232d62213dbcca8d6d2cf3
-
SHA256
375d690a75254f5b58018e443205c6800270e553234845d92378b90023c9dc13
-
SHA512
605fd043c9978d8f8834bef3a65f07e3513e53c5b2dd15f4a3853fba87e93ae05df4987921e40c9e29c1d8850f3ce090ffce48714601c55bf85eb00c7de5234d
-
SSDEEP
3072:g0SaHey6uGxBKa+OKaGWvPa6Oua6W21lq6+Oq6GWPv6aOu6aW2J5Ka+OKaGWvPak:j
Static task
static1
Behavioral task
behavioral1
Sample
375d690a75254f5b58018e443205c6800270e553234845d92378b90023c9dc13.js
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
375d690a75254f5b58018e443205c6800270e553234845d92378b90023c9dc13.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
Extracted
xworm
5.0
christyrusike21.duckdns.org:7000
znkTtudE0WUuGVBW
-
install_file
USB.exe
Targets
-
-
Target
375d690a75254f5b58018e443205c6800270e553234845d92378b90023c9dc13.js
-
Size
47.0MB
-
MD5
e633eaeb161017eec584bd3f042cde07
-
SHA1
6c0181476a703f2cc7232d62213dbcca8d6d2cf3
-
SHA256
375d690a75254f5b58018e443205c6800270e553234845d92378b90023c9dc13
-
SHA512
605fd043c9978d8f8834bef3a65f07e3513e53c5b2dd15f4a3853fba87e93ae05df4987921e40c9e29c1d8850f3ce090ffce48714601c55bf85eb00c7de5234d
-
SSDEEP
3072:g0SaHey6uGxBKa+OKaGWvPa6Oua6W21lq6+Oq6GWPv6aOu6aW2J5Ka+OKaGWvPak:j
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-