General

  • Target

    3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b.vbs

  • Size

    507KB

  • Sample

    241003-bpw82axbkq

  • MD5

    8826da2dae531f219269ca314cec4f88

  • SHA1

    a5c24e29d2b9901a0849fe4c70dd67733febcb57

  • SHA256

    3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b

  • SHA512

    9899a75d918671927f0dce5824135427899d75c88c153f78e8fa9ca5d39383a2cb33d092376ae631f507a3bd855636968724d9509d180e2c3a0a307a697e7de5

  • SSDEEP

    12288:r4IJKsC/UX6neBCN6Jy7f24Sjmr8NeAkWrIXbl/MCmgdTQFq30+XDNNRsgbZAKIo:kkgn2MHhso/

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Targets

    • Target

      3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b.vbs

    • Size

      507KB

    • MD5

      8826da2dae531f219269ca314cec4f88

    • SHA1

      a5c24e29d2b9901a0849fe4c70dd67733febcb57

    • SHA256

      3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b

    • SHA512

      9899a75d918671927f0dce5824135427899d75c88c153f78e8fa9ca5d39383a2cb33d092376ae631f507a3bd855636968724d9509d180e2c3a0a307a697e7de5

    • SSDEEP

      12288:r4IJKsC/UX6neBCN6Jy7f24Sjmr8NeAkWrIXbl/MCmgdTQFq30+XDNNRsgbZAKIo:kkgn2MHhso/

    Score
    10/10
    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks