General
-
Target
8dbbfc2bec2772f7fb6e82b2293220c521b165fabb50e6b6c19cb3234dcfe858
-
Size
233KB
-
Sample
240906-xh6d1sshjf
-
MD5
bbc1697cc300fc87f4aa2b793b465089
-
SHA1
9bfedddefb13d6f3664c3f89b4ff9ad3022c2c30
-
SHA256
8dbbfc2bec2772f7fb6e82b2293220c521b165fabb50e6b6c19cb3234dcfe858
-
SHA512
5613d93c83c8dde8b208f5d0d180e262049068d31ff3fb8aabea8f4a9dd931853fdda7d9329b3f00ed4b708bfd8a522bd398d145a165d437b219db35fede347f
-
SSDEEP
6144:zbytKFpHjQp7t971DUUC/IrFurYWI9pU21kW+30SEHAa1Xcz86LXrdG:ytCVQp7rt3CRrpILU2KLrDaW5XrU
Static task
static1
Behavioral task
behavioral1
Sample
04f2e728cb9c631c92f2b9e03f69931910866269d8f4723d8e33d4eb124c45ec.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
04f2e728cb9c631c92f2b9e03f69931910866269d8f4723d8e33d4eb124c45ec.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg
Targets
-
-
Target
04f2e728cb9c631c92f2b9e03f69931910866269d8f4723d8e33d4eb124c45ec
-
Size
598KB
-
MD5
4c0287584692314400f8051a8c734e95
-
SHA1
249e0641abdd69d0083eacb350b099d872211f8c
-
SHA256
04f2e728cb9c631c92f2b9e03f69931910866269d8f4723d8e33d4eb124c45ec
-
SHA512
3b424b7289ce6c6c1f9bd97c2cf5144b625299e50babe4afaa62981af1ddbedd40fe4c8bbd0d369e31d5d96e343101f76b1d591f709c6e423855a96865e45e85
-
SSDEEP
12288:WGKC2l0k5OFLSd28Wia/Lp5nE9ufGjG1o2jTtNELaZ4s4smIYfPahsqxFvhPToaN:7rI7XgYY
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-