General

  • Target

    19092024_0649_Purchase Order.js.zip

  • Size

    240KB

  • Sample

    240919-hlh1kawdkq

  • MD5

    deefd47743e3937610c94d238aa00f60

  • SHA1

    050927554986513ec5cfb64856fbe01b95818865

  • SHA256

    879fa7f8b4bff5ac3937d842473a06c94d8806793d0ed4c6649355f3b62f2719

  • SHA512

    9c1ee33489ace14b082ae31012655ef9924e7293cb38cc9e57fc75751ac269e183f60d5972933dc61495105b77b69f1b2526dd57d7e466b9d65559215bfd8629

  • SSDEEP

    3072:rLT3HnQg9Chulittrt0EvEw3FwyUXHEHr3x3oDQyIbZmrUUv4dSocLrEZaitEWwI:rLTwhulMD07w3nUXaxFPsVIaTjkhHX

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Targets

    • Target

      Purchase Order.js

    • Size

      602KB

    • MD5

      c23145032eb9417255ffe33e719afaf2

    • SHA1

      b0a2b6174179ef5d05489253802030b4fda20165

    • SHA256

      61f366924b6047fc1edf5494e19322990fcd3544641cdf26c63d893116a712ee

    • SHA512

      fcb72da665866518fac8a02081cda1fa988aa47c8dc4ec25fe18063637117c7c693de71a2914eefbb89431fcf964857e07fdfce5cb6bf8a5f4919951e8f9835e

    • SSDEEP

      12288:L0jCPxgfEU+BG/njP9Rc8AfSeh/xxvLmKiinJ/9xuaRZb7bIsDvZX9i4Mw61uBKW:nsbdc52Gz/SkD9

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks