General
-
Target
8f76e86093d71f34c2e6f824984034185964f3d15c28df1b61adf5165fbb212e.rtf
-
Size
67KB
-
Sample
241002-g6jbds1fpp
-
MD5
c9ac55d64a51738b57f065449c7e3911
-
SHA1
7b9dd5b4e76e99d711b0fe11582e6ff06d9ca830
-
SHA256
8f76e86093d71f34c2e6f824984034185964f3d15c28df1b61adf5165fbb212e
-
SHA512
6d78c5a5cfc7fa34942e87ceae41d6e97debaa9469831ffbc4482c9fc1b531a171b1a12fe6ff3902b8919aee94bdf619cd0b43daba07166d9e47042a9eaf8e60
-
SSDEEP
768:ZD+xsejlud5HY1ayCyu7OHAzlzjRYEX4Bo:ZGjE3qy7OglR9XWo
Static task
static1
Behavioral task
behavioral1
Sample
8f76e86093d71f34c2e6f824984034185964f3d15c28df1b61adf5165fbb212e.rtf
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8f76e86093d71f34c2e6f824984034185964f3d15c28df1b61adf5165fbb212e.rtf
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Targets
-
-
Target
8f76e86093d71f34c2e6f824984034185964f3d15c28df1b61adf5165fbb212e.rtf
-
Size
67KB
-
MD5
c9ac55d64a51738b57f065449c7e3911
-
SHA1
7b9dd5b4e76e99d711b0fe11582e6ff06d9ca830
-
SHA256
8f76e86093d71f34c2e6f824984034185964f3d15c28df1b61adf5165fbb212e
-
SHA512
6d78c5a5cfc7fa34942e87ceae41d6e97debaa9469831ffbc4482c9fc1b531a171b1a12fe6ff3902b8919aee94bdf619cd0b43daba07166d9e47042a9eaf8e60
-
SSDEEP
768:ZD+xsejlud5HY1ayCyu7OHAzlzjRYEX4Bo:ZGjE3qy7OglR9XWo
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-