General

  • Target

    02102024010730092024452773892199400.gz

  • Size

    73KB

  • Sample

    241002-ft1jgaydqk

  • MD5

    769d2aaa3fc90d12e284a5c53367214f

  • SHA1

    7229fa9e2dea6891de3927c4a9668a0599c09bb0

  • SHA256

    fdd6703768a3927d2939099359cbea83d684d14706fbca4421b331d550aa3c65

  • SHA512

    3b57ef00cbeb9797f3fa57a410a2bd2d4f631ce90a0c5733a2a5dbbd59e9b73849741d0d77b754f16cee8ce1f4a27d327d2d331ae32a127e5f407b8416969c91

  • SSDEEP

    1536:FvYPpeVIq+zVuekDmtPpLZ1n8yim+h05UCkkCTN+tq84a:ypjqkVuekDy5pimx5YkC5+tL

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt

exe.dropper

https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt

Targets

    • Target

      452773892199400.js

    • Size

      198KB

    • MD5

      8a4caeb85a99c4cba82bc48f3668986d

    • SHA1

      99399b238f8b594bf247e517f7af5025668575f3

    • SHA256

      6f646354fed6f9fb7769dffdb572dbb267acf3c24a0498b4561db3e90a1219c2

    • SHA512

      c0fe0630c841d89fe5386547bef7292c0c06f57329fecdfbb0397f8a969d18ef5a562dfb0ecd6c8e22d60ee38245f69b586c494329fbf55881f76ef3fb0e8503

    • SSDEEP

      6144:3cIC5cYmgSoAIHFdYHl4xO4k2WF+l1QUP/XCxJn:pC5cYmgSqdYF4xOql1QUPKxJn

    • Detects Obj3ctivity Stage1

      Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.

    • Obj3ctivity, PXRECVOWEIWOEI

      Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks