General

  • Target

    1dd1b7dfae5bc447fde444e46f1251e1b8fb452419e7a29044a5f4d829f2a13f.js

  • Size

    597KB

  • Sample

    240919-hq6meswfkp

  • MD5

    1d8e8e33ae43b4856ddf2007465318b6

  • SHA1

    51b1e1c2d89eb16b33bbace87054f287705785a8

  • SHA256

    1dd1b7dfae5bc447fde444e46f1251e1b8fb452419e7a29044a5f4d829f2a13f

  • SHA512

    e5bfca51ea7eb5d502e412084e5f7fad4c2ac967452c89ec54f860c0e645a778da125cde108535aaf30c131d2df510167ab2320f7d83b6fb0bc61b5e3c1c26e3

  • SSDEEP

    12288:+MmmaqthG/7x9kN53djsZHQts1m3DttNJiZtnGGVHp1/8ophcpmAOiipBXHrX3D7:daSdjyRh+Uia

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

exe.dropper

https://ia601606.us.archive.org/10/items/deathnote_202407/deathnote.jpg

Targets

    • Target

      1dd1b7dfae5bc447fde444e46f1251e1b8fb452419e7a29044a5f4d829f2a13f.js

    • Size

      597KB

    • MD5

      1d8e8e33ae43b4856ddf2007465318b6

    • SHA1

      51b1e1c2d89eb16b33bbace87054f287705785a8

    • SHA256

      1dd1b7dfae5bc447fde444e46f1251e1b8fb452419e7a29044a5f4d829f2a13f

    • SHA512

      e5bfca51ea7eb5d502e412084e5f7fad4c2ac967452c89ec54f860c0e645a778da125cde108535aaf30c131d2df510167ab2320f7d83b6fb0bc61b5e3c1c26e3

    • SSDEEP

      12288:+MmmaqthG/7x9kN53djsZHQts1m3DttNJiZtnGGVHp1/8ophcpmAOiipBXHrX3D7:daSdjyRh+Uia

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks