General
-
Target
02102024010730092024452773892199400.gz
-
Size
73KB
-
Sample
241002-ft1jgaydqk
-
MD5
769d2aaa3fc90d12e284a5c53367214f
-
SHA1
7229fa9e2dea6891de3927c4a9668a0599c09bb0
-
SHA256
fdd6703768a3927d2939099359cbea83d684d14706fbca4421b331d550aa3c65
-
SHA512
3b57ef00cbeb9797f3fa57a410a2bd2d4f631ce90a0c5733a2a5dbbd59e9b73849741d0d77b754f16cee8ce1f4a27d327d2d331ae32a127e5f407b8416969c91
-
SSDEEP
1536:FvYPpeVIq+zVuekDmtPpLZ1n8yim+h05UCkkCTN+tq84a:ypjqkVuekDy5pimx5YkC5+tL
Static task
static1
Behavioral task
behavioral1
Sample
452773892199400.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
452773892199400.js
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNote_J.txt
Targets
-
-
Target
452773892199400.js
-
Size
198KB
-
MD5
8a4caeb85a99c4cba82bc48f3668986d
-
SHA1
99399b238f8b594bf247e517f7af5025668575f3
-
SHA256
6f646354fed6f9fb7769dffdb572dbb267acf3c24a0498b4561db3e90a1219c2
-
SHA512
c0fe0630c841d89fe5386547bef7292c0c06f57329fecdfbb0397f8a969d18ef5a562dfb0ecd6c8e22d60ee38245f69b586c494329fbf55881f76ef3fb0e8503
-
SSDEEP
6144:3cIC5cYmgSoAIHFdYHl4xO4k2WF+l1QUP/XCxJn:pC5cYmgSqdYF4xOql1QUPKxJn
-
Obj3ctivity, PXRECVOWEIWOEI
Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-