General
-
Target
19092024_0653_Swift Copy of USD 11961.50.js.gz
-
Size
233KB
-
Sample
240919-hnz2vswekr
-
MD5
a858dc2166f41d0ef25fe3e485dd2b74
-
SHA1
f80de5f73843334c86033a8cedb4ad34645a66e9
-
SHA256
13539fc43990603a5ff03ea822047b4dc9fd497bd5e02848e85bb2a94740a0a6
-
SHA512
3bc6251b68efd9a05e84a297772c6ea6429044c65d43a7fa5d019bc4c4f8927339dac5c89e50c616e67e795e89c93f0dd4b195e8ff309d545e7537c16728aa06
-
SSDEEP
6144:14imFwA1noR8rpYo3x6q51Bd5jdasrtsuiJc++A:14i5Wr56qzbaogWA
Static task
static1
Behavioral task
behavioral1
Sample
Swift Copy of USD 11961.50.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Swift Copy of USD 11961.50.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
Targets
-
-
Target
Swift Copy of USD 11961.50.js
-
Size
603KB
-
MD5
fe8cfc59d5069342f1d6b42822ea2577
-
SHA1
641c2747423abbf598148cfb1d1006becffb60bc
-
SHA256
ee7711a9df0823e2f820b6a1cacc69a86c0694719ffb6373b6c5428c97d969a8
-
SHA512
5c4408cc638d8484ad7f745b60ed4eb7aae7d911538ac986ed858fd93402ff1449f9d38e1f35bfac407edd920e1e3e386cf850db01d71eae6e40989b20ad7f82
-
SSDEEP
12288:lHapg5WlvjbwO8wd8yTYhq6YGOx+QXVT5dmWIRXRBU6p9TY+lwhiaZaCLaP7OXXW:9dn2XzIVQ0
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-