General
-
Target
6da74e92c740c4443c54a8243037d0a2d9fac8f34764d1a86933063e5790ef2a.vbs
-
Size
504KB
-
Sample
241002-dym3tsvdlk
-
MD5
73116ddf40456b41c6b35023bc02e781
-
SHA1
037b869900d0474bf7603b8fbe3401f517f52117
-
SHA256
6da74e92c740c4443c54a8243037d0a2d9fac8f34764d1a86933063e5790ef2a
-
SHA512
f60cbe6234371aacd3f42f87db8ea04cc3b982d9c356db5a1e0fa3959268c0aa8e78e4c059feac1619348a3453e55c3386e096812d2a4a6d61aca5cc99007be3
-
SSDEEP
12288:VS57Wp1MYi6qsGrA2OGLmeq0wM/l1d0FUvoExHRbb4XJb7q5cPT+EmJu6X:VC6X0T5VnpJ4Za
Static task
static1
Behavioral task
behavioral1
Sample
6da74e92c740c4443c54a8243037d0a2d9fac8f34764d1a86933063e5790ef2a.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6da74e92c740c4443c54a8243037d0a2d9fac8f34764d1a86933063e5790ef2a.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
Targets
-
-
Target
6da74e92c740c4443c54a8243037d0a2d9fac8f34764d1a86933063e5790ef2a.vbs
-
Size
504KB
-
MD5
73116ddf40456b41c6b35023bc02e781
-
SHA1
037b869900d0474bf7603b8fbe3401f517f52117
-
SHA256
6da74e92c740c4443c54a8243037d0a2d9fac8f34764d1a86933063e5790ef2a
-
SHA512
f60cbe6234371aacd3f42f87db8ea04cc3b982d9c356db5a1e0fa3959268c0aa8e78e4c059feac1619348a3453e55c3386e096812d2a4a6d61aca5cc99007be3
-
SSDEEP
12288:VS57Wp1MYi6qsGrA2OGLmeq0wM/l1d0FUvoExHRbb4XJb7q5cPT+EmJu6X:VC6X0T5VnpJ4Za
-
Obj3ctivity, PXRECVOWEIWOEI
Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-