General
-
Target
60987a7f9108d404f6e627e7619141b77542cad0b224935c08161ac3f51c2b29.bin
-
Size
653KB
-
Sample
220301-wstbrsbag7
-
MD5
db2e487937eaed60e7169e2b48e68d16
-
SHA1
2210476000b468726672586519dab9018285ac37
-
SHA256
60987a7f9108d404f6e627e7619141b77542cad0b224935c08161ac3f51c2b29
-
SHA512
e3a7f8d8e3657a327227507e6f579a67eae3847b5bb20eeac13414738dd431709f5bad1d27cc8610baae45f3bd6ec7266192af7583ce9ff6f00366fca629f464
Static task
static1
Behavioral task
behavioral1
Sample
60987a7f9108d404f6e627e7619141b77542cad0b224935c08161ac3f51c2b29.exe
Resource
win7-20220223-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/855741652172668938/zP2fr-M7cRreY83gv1pyNcOoaU2XiDMn2LeRM_y5_L1sMkvKAymQPW05meJF52Pblm-2
Targets
-
-
Target
60987a7f9108d404f6e627e7619141b77542cad0b224935c08161ac3f51c2b29.bin
-
Size
653KB
-
MD5
db2e487937eaed60e7169e2b48e68d16
-
SHA1
2210476000b468726672586519dab9018285ac37
-
SHA256
60987a7f9108d404f6e627e7619141b77542cad0b224935c08161ac3f51c2b29
-
SHA512
e3a7f8d8e3657a327227507e6f579a67eae3847b5bb20eeac13414738dd431709f5bad1d27cc8610baae45f3bd6ec7266192af7583ce9ff6f00366fca629f464
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-