General
-
Target
c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168.js
-
Size
328KB
-
Sample
240809-b1dwtsxhqa
-
MD5
6837307ec45d904b112be679217c4753
-
SHA1
10e00ce374f8ebb3e54f6d26d99e8db6a6383e15
-
SHA256
c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168
-
SHA512
32087813f7826c052415592313a77a362033133034f0ad055480f063c4aa5d1de3da2e4bb38919da67f0f13e984d71f66c52455ed254634825f453f964717ef5
-
SSDEEP
6144:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkU1FxB1F5J2WlFhBlFpJAw1FRh1FZp2Wl6:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkl
Static task
static1
Behavioral task
behavioral1
Sample
c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
Extracted
xworm
5.0
lisa22194141.duckdns.org:7000
x8iJFYABjI83VZm2
-
install_file
USB.exe
Targets
-
-
Target
c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168.js
-
Size
328KB
-
MD5
6837307ec45d904b112be679217c4753
-
SHA1
10e00ce374f8ebb3e54f6d26d99e8db6a6383e15
-
SHA256
c6b076cf47cd1b57a71acfb1e5d257c657403af0ae983f4084a4057e18e81168
-
SHA512
32087813f7826c052415592313a77a362033133034f0ad055480f063c4aa5d1de3da2e4bb38919da67f0f13e984d71f66c52455ed254634825f453f964717ef5
-
SSDEEP
6144:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkU1FxB1F5J2WlFhBlFpJAw1FRh1FZp2Wl6:O591JBdVhpcc1FRh1FZp2WlFBhlFJpkl
-
Detect Xworm Payload
-
StormKitty payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-