General

  • Target

    19092024_0653_Swift Copy of USD 11961.50.js.gz

  • Size

    233KB

  • Sample

    240919-hnz2vswekr

  • MD5

    a858dc2166f41d0ef25fe3e485dd2b74

  • SHA1

    f80de5f73843334c86033a8cedb4ad34645a66e9

  • SHA256

    13539fc43990603a5ff03ea822047b4dc9fd497bd5e02848e85bb2a94740a0a6

  • SHA512

    3bc6251b68efd9a05e84a297772c6ea6429044c65d43a7fa5d019bc4c4f8927339dac5c89e50c616e67e795e89c93f0dd4b195e8ff309d545e7537c16728aa06

  • SSDEEP

    6144:14imFwA1noR8rpYo3x6q51Bd5jdasrtsuiJc++A:14i5Wr56qzbaogWA

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

exe.dropper

https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt

Targets

    • Target

      Swift Copy of USD 11961.50.js

    • Size

      603KB

    • MD5

      fe8cfc59d5069342f1d6b42822ea2577

    • SHA1

      641c2747423abbf598148cfb1d1006becffb60bc

    • SHA256

      ee7711a9df0823e2f820b6a1cacc69a86c0694719ffb6373b6c5428c97d969a8

    • SHA512

      5c4408cc638d8484ad7f745b60ed4eb7aae7d911538ac986ed858fd93402ff1449f9d38e1f35bfac407edd920e1e3e386cf850db01d71eae6e40989b20ad7f82

    • SSDEEP

      12288:lHapg5WlvjbwO8wd8yTYhq6YGOx+QXVT5dmWIRXRBU6p9TY+lwhiaZaCLaP7OXXW:9dn2XzIVQ0

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks