General
-
Target
d008327587cb0d38e2c8c50084e6681f14083c8e40110059c14dcf54c86f8707
-
Size
102KB
-
Sample
241004-q3873s1frb
-
MD5
b11e94b7e6664725aa3f119a774c28cf
-
SHA1
ffe18441c9347fb72c72612a242bcb5b688479d6
-
SHA256
d008327587cb0d38e2c8c50084e6681f14083c8e40110059c14dcf54c86f8707
-
SHA512
f32b0a09442c593ba447d72be39ae1b933af18627b7ad5207f0267c9f62a672c29d2a18682bcaf2ea6f5f5827dad220d6fe643b71a0c283c00b794caf15170af
-
SSDEEP
384:qRmtsvKPJXBSWodGarLaKesiPerSXPOUNyYf4aoG8QyiBuW/A5xpVb+385T77z:EiBBSWoRBzUP9747GxuW/uLb+uT7n
Static task
static1
Behavioral task
behavioral1
Sample
d008327587cb0d38e2c8c50084e6681f14083c8e40110059c14dcf54c86f8707.rtf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d008327587cb0d38e2c8c50084e6681f14083c8e40110059c14dcf54c86f8707.rtf
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Targets
-
-
Target
d008327587cb0d38e2c8c50084e6681f14083c8e40110059c14dcf54c86f8707
-
Size
102KB
-
MD5
b11e94b7e6664725aa3f119a774c28cf
-
SHA1
ffe18441c9347fb72c72612a242bcb5b688479d6
-
SHA256
d008327587cb0d38e2c8c50084e6681f14083c8e40110059c14dcf54c86f8707
-
SHA512
f32b0a09442c593ba447d72be39ae1b933af18627b7ad5207f0267c9f62a672c29d2a18682bcaf2ea6f5f5827dad220d6fe643b71a0c283c00b794caf15170af
-
SSDEEP
384:qRmtsvKPJXBSWodGarLaKesiPerSXPOUNyYf4aoG8QyiBuW/A5xpVb+385T77z:EiBBSWoRBzUP9747GxuW/uLb+uT7n
-
Blocklisted process makes network request
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-