General
-
Target
19092024_0649_Purchase Order.js.zip
-
Size
240KB
-
Sample
240919-hlh1kawdkq
-
MD5
deefd47743e3937610c94d238aa00f60
-
SHA1
050927554986513ec5cfb64856fbe01b95818865
-
SHA256
879fa7f8b4bff5ac3937d842473a06c94d8806793d0ed4c6649355f3b62f2719
-
SHA512
9c1ee33489ace14b082ae31012655ef9924e7293cb38cc9e57fc75751ac269e183f60d5972933dc61495105b77b69f1b2526dd57d7e466b9d65559215bfd8629
-
SSDEEP
3072:rLT3HnQg9Chulittrt0EvEw3FwyUXHEHr3x3oDQyIbZmrUUv4dSocLrEZaitEWwI:rLTwhulMD07w3nUXaxFPsVIaTjkhHX
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
Targets
-
-
Target
Purchase Order.js
-
Size
602KB
-
MD5
c23145032eb9417255ffe33e719afaf2
-
SHA1
b0a2b6174179ef5d05489253802030b4fda20165
-
SHA256
61f366924b6047fc1edf5494e19322990fcd3544641cdf26c63d893116a712ee
-
SHA512
fcb72da665866518fac8a02081cda1fa988aa47c8dc4ec25fe18063637117c7c693de71a2914eefbb89431fcf964857e07fdfce5cb6bf8a5f4919951e8f9835e
-
SSDEEP
12288:L0jCPxgfEU+BG/njP9Rc8AfSeh/xxvLmKiinJ/9xuaRZb7bIsDvZX9i4Mw61uBKW:nsbdc52Gz/SkD9
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-