General

  • Target

    8dbbfc2bec2772f7fb6e82b2293220c521b165fabb50e6b6c19cb3234dcfe858

  • Size

    233KB

  • Sample

    240906-xh6d1sshjf

  • MD5

    bbc1697cc300fc87f4aa2b793b465089

  • SHA1

    9bfedddefb13d6f3664c3f89b4ff9ad3022c2c30

  • SHA256

    8dbbfc2bec2772f7fb6e82b2293220c521b165fabb50e6b6c19cb3234dcfe858

  • SHA512

    5613d93c83c8dde8b208f5d0d180e262049068d31ff3fb8aabea8f4a9dd931853fdda7d9329b3f00ed4b708bfd8a522bd398d145a165d437b219db35fede347f

  • SSDEEP

    6144:zbytKFpHjQp7t971DUUC/IrFurYWI9pU21kW+30SEHAa1Xcz86LXrdG:ytCVQp7rt3CRrpILU2KLrDaW5XrU

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Targets

    • Target

      04f2e728cb9c631c92f2b9e03f69931910866269d8f4723d8e33d4eb124c45ec

    • Size

      598KB

    • MD5

      4c0287584692314400f8051a8c734e95

    • SHA1

      249e0641abdd69d0083eacb350b099d872211f8c

    • SHA256

      04f2e728cb9c631c92f2b9e03f69931910866269d8f4723d8e33d4eb124c45ec

    • SHA512

      3b424b7289ce6c6c1f9bd97c2cf5144b625299e50babe4afaa62981af1ddbedd40fe4c8bbd0d369e31d5d96e343101f76b1d591f709c6e423855a96865e45e85

    • SSDEEP

      12288:WGKC2l0k5OFLSd28Wia/Lp5nE9ufGjG1o2jTtNELaZ4s4smIYfPahsqxFvhPToaN:7rI7XgYY

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks