General
-
Target
Enquiry-Dubai.js
-
Size
176KB
-
Sample
250204-1jn3xatmcx
-
MD5
acedc7bdca0d19b982bcf030c73599ed
-
SHA1
dc39301e166c50e7d9ac8128135a2370254d52c8
-
SHA256
944c7070cb77d937c9bae8c30a367b1c15b2f8951329cdb64d4b02a5e145ea44
-
SHA512
3b4b5ad27169fd67b52625c43bad6d62c01981e5c79cdff540f825456fe098568c5078b18eb2056bc7140ea5da9689135d6976ff4039dbaa74e85c4ea3c0c341
-
SSDEEP
1536:UgOYlGWHi69D3fO2pKAfsj5zRDzRnmZ6xE7EyxsZ0gaY9uBc4q0F5v5FKMUBYWOe:LOYcWHN9jO2pF4l96g3uBu0XRlcT
Static task
static1
Behavioral task
behavioral1
Sample
Enquiry-Dubai.js
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Enquiry-Dubai.js
Resource
win10v2004-20250129-en
Malware Config
Extracted
https://res.cloudinary.com/daxwua63y/image/upload/v1738334533/alcb4htolzvfhzzufqh5.jpg
https://res.cloudinary.com/daxwua63y/image/upload/v1738334533/alcb4htolzvfhzzufqh5.jpg
Targets
-
-
Target
Enquiry-Dubai.js
-
Size
176KB
-
MD5
acedc7bdca0d19b982bcf030c73599ed
-
SHA1
dc39301e166c50e7d9ac8128135a2370254d52c8
-
SHA256
944c7070cb77d937c9bae8c30a367b1c15b2f8951329cdb64d4b02a5e145ea44
-
SHA512
3b4b5ad27169fd67b52625c43bad6d62c01981e5c79cdff540f825456fe098568c5078b18eb2056bc7140ea5da9689135d6976ff4039dbaa74e85c4ea3c0c341
-
SSDEEP
1536:UgOYlGWHi69D3fO2pKAfsj5zRDzRnmZ6xE7EyxsZ0gaY9uBc4q0F5v5FKMUBYWOe:LOYcWHN9jO2pF4l96g3uBu0XRlcT
-
Obj3ctivity family
-
Obj3ctivity, PXRECVOWEIWOEI
Obj3ctivity aka PXRECVOWEIWOEI is an infostealer written in C#.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1