General
-
Target
9d2ff90f5169a6e991c79ab361753fd0264be8901bb2c6454d8465fa6edea45d.bin
-
Size
274KB
-
Sample
220301-wthlnabah5
-
MD5
6b52dca4b1666f622768590ad5f0b92a
-
SHA1
be4ad2f00babdbb9cbe335f636696c0ebee8e7c4
-
SHA256
9d2ff90f5169a6e991c79ab361753fd0264be8901bb2c6454d8465fa6edea45d
-
SHA512
d7264b1d6d757b17bd2d9e79f24c88dcaf18ba8d0050b00e6866b695d576885c3d89b5da4afdbf19ffefa92a91625852cf74b333a013eb8aea11016069e0132d
Static task
static1
Behavioral task
behavioral1
Sample
9d2ff90f5169a6e991c79ab361753fd0264be8901bb2c6454d8465fa6edea45d.exe
Resource
win7-en-20211208
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/944100345360027648/OXiqXgDP9MX8jylpP-V-9VcSkCLoIlG7dkkrxbxoWl_rMi6sHSXZgSZ0uzZn9Qtqy2RN
Targets
-
-
Target
9d2ff90f5169a6e991c79ab361753fd0264be8901bb2c6454d8465fa6edea45d.bin
-
Size
274KB
-
MD5
6b52dca4b1666f622768590ad5f0b92a
-
SHA1
be4ad2f00babdbb9cbe335f636696c0ebee8e7c4
-
SHA256
9d2ff90f5169a6e991c79ab361753fd0264be8901bb2c6454d8465fa6edea45d
-
SHA512
d7264b1d6d757b17bd2d9e79f24c88dcaf18ba8d0050b00e6866b695d576885c3d89b5da4afdbf19ffefa92a91625852cf74b333a013eb8aea11016069e0132d
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-