General

  • Target

    27256APPROVEDACHpmt187023OI2783764.js

  • Size

    674KB

  • Sample

    240818-n24j4awalj

  • MD5

    093443df3ed07e88bd040e994ad5abda

  • SHA1

    0b5c84cca541adc1c68cceb7ba5d1887df7603a4

  • SHA256

    5670c18d10201f544296e4cf42c05f8e4c4c150dc4f82466f92359bfacc7f53a

  • SHA512

    b6865b8c36c03b0ae9ab98279e8a40ca994faef010456f6a704626864d61db29b29b0bea4823fe15bab3799ddeca5ec5b4a33d3ce7152ad540dc9274e6253549

  • SSDEEP

    12288:Nxazi8wH8bDCeEdM8btYyRPDUuprkCd3Vz/LNFhpIQnz3By4H/unqFNZ3kX7VQ7f:xpfrPZZZgQD+XKAC

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Targets

    • Target

      27256APPROVEDACHpmt187023OI2783764.js

    • Size

      674KB

    • MD5

      093443df3ed07e88bd040e994ad5abda

    • SHA1

      0b5c84cca541adc1c68cceb7ba5d1887df7603a4

    • SHA256

      5670c18d10201f544296e4cf42c05f8e4c4c150dc4f82466f92359bfacc7f53a

    • SHA512

      b6865b8c36c03b0ae9ab98279e8a40ca994faef010456f6a704626864d61db29b29b0bea4823fe15bab3799ddeca5ec5b4a33d3ce7152ad540dc9274e6253549

    • SSDEEP

      12288:Nxazi8wH8bDCeEdM8btYyRPDUuprkCd3Vz/LNFhpIQnz3By4H/unqFNZ3kX7VQ7f:xpfrPZZZgQD+XKAC

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks