General
-
Target
Inquiry.js
-
Size
162KB
-
Sample
250115-kzlpqaxrcv
-
MD5
459f759046d6def3f4524d28eab22476
-
SHA1
46af0da70b77d98d4773023554dacc1f968b93a1
-
SHA256
70a82edf7f26167e6b7df16d624d29d45fd220bb47b8407bc58ee6f7b8c822d3
-
SHA512
f440b3263f621ddc3113084c7aa8a9acc876c19c97138f0c923d2a65f30203d3d4141f49bf0997b9426f60c42f667094d74e0e3f8fff2fabebf938fdd0cdf264
-
SSDEEP
1536:DCd0yFOp29X3u7EWFOm3xE7E9GQ0c4RTXN4uzQ6VJYCkR5O+6puYszWTC4mKcAWy:DCdTFOE9OoWlN0XJzQ6VPk7yx
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Inquiry.js
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20
https://ia600805.us.archive.org/10/items/new_image_202501/new_image.jpg%20
Targets
-
-
Target
Inquiry.js
-
Size
162KB
-
MD5
459f759046d6def3f4524d28eab22476
-
SHA1
46af0da70b77d98d4773023554dacc1f968b93a1
-
SHA256
70a82edf7f26167e6b7df16d624d29d45fd220bb47b8407bc58ee6f7b8c822d3
-
SHA512
f440b3263f621ddc3113084c7aa8a9acc876c19c97138f0c923d2a65f30203d3d4141f49bf0997b9426f60c42f667094d74e0e3f8fff2fabebf938fdd0cdf264
-
SSDEEP
1536:DCd0yFOp29X3u7EWFOm3xE7E9GQ0c4RTXN4uzQ6VJYCkR5O+6puYszWTC4mKcAWy:DCdTFOE9OoWlN0XJzQ6VPk7yx
-
Obj3ctivity family
-
Obj3ctivity, PXRECVOWEIWOEI
Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1