General
-
Target
200920241419PURCHASEORDER.js.gz
-
Size
119KB
-
Sample
240920-wwfvvazhrn
-
MD5
569eb1f38f3858c9af458dc3269abd3a
-
SHA1
c1b7928a95abdef871e4d8ae244c53405ef9dbff
-
SHA256
9953c57867a87d6d545da17a94580d567c4193ab28b70de8dd9ac253f11e2969
-
SHA512
1f24b2a296d1d09c0759edb9e86efe2f73ad38d0c80ddd2f56ba8255d5190972e939d67dbbcd513adde03da1d150028818b8070d2b5938448d64887f31a4d3fd
-
SSDEEP
3072:anS1QMQ4zRjorh3WzPJUti+mHGQJLGFvI2P:MSJKGzPmtZm/QFRP
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
https://ia904601.us.archive.org/6/items/detah-note-j/DetahNoteJ.txt
Targets
-
-
Target
PURCHASE ORDER.js
-
Size
319KB
-
MD5
e8114157714655fdbc7b51cde4f676de
-
SHA1
c23a2b3c76b2b7927f64cf74c3cf75b408a629e4
-
SHA256
d20d1cb56afa7818be3b26074bed7eae73e5480a5a8e0add5384bc9eddbc333d
-
SHA512
9f33a77504f56f4b0bce859d3b61f81cf3496a00d6cfd3aaef708f700149c72f1fb009f15e720a59b013a443c15b3c68a621358c624138b72f3409db53692c8b
-
SSDEEP
6144:1m06WlUzat6poIKNrZUG8IyWwmRn+CvA1HPucBzprZa8qYlVLY8/1PcKpOu4:w06WF6poIKN9UGDykRn+gA1HPu4zpNar
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-