General

  • Target

    paste.js

  • Size

    3KB

  • Sample

    250130-2vyl6avmgs

  • MD5

    affbcba0899f7fb6af87418706eabb0c

  • SHA1

    46e4e6b23c523a45a65dbd916f98f5476a4cd09a

  • SHA256

    6c15201ff41059d46bce1d287fd60ca954e9a1ae76e22dc475f953e4328acde8

  • SHA512

    68acae9c905e545f6d1fcec0255a4d13b9f0c8ddafb597b0ea2a686a6349d089a6736e6355cad19086ca66ad4c12e5ab732dc20990230636e3b5dbab374bc6f0

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://res.cloudinary.com/daxwua63y/image/upload/v1737696171/heke2pmteuw8sqsplhkl.jpg

exe.dropper

https://res.cloudinary.com/daxwua63y/image/upload/v1737696171/heke2pmteuw8sqsplhkl.jpg

Targets

    • Target

      paste.js

    • Size

      3KB

    • MD5

      affbcba0899f7fb6af87418706eabb0c

    • SHA1

      46e4e6b23c523a45a65dbd916f98f5476a4cd09a

    • SHA256

      6c15201ff41059d46bce1d287fd60ca954e9a1ae76e22dc475f953e4328acde8

    • SHA512

      68acae9c905e545f6d1fcec0255a4d13b9f0c8ddafb597b0ea2a686a6349d089a6736e6355cad19086ca66ad4c12e5ab732dc20990230636e3b5dbab374bc6f0

    • Detects Obj3ctivity Stage1

      Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.

    • Obj3ctivity family

    • Obj3ctivity, PXRECVOWEIWOEI

      Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks