General
-
Target
b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.bin
-
Size
274KB
-
Sample
220301-wtn4facfej
-
MD5
1774b03fe04c0912378903346f6d807a
-
SHA1
33fbaeeb05bfe3e985af80a4f400dbc236fa51bd
-
SHA256
b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b
-
SHA512
8a76d27bc58ccc481bbdaa726483bf84b8a5c3e6512b6259a26b64fffea697900edc1efe5405c9b6a6ac61fbcc8bc0653b506692dde7f1c1251692595bd4aec0
Static task
static1
Behavioral task
behavioral1
Sample
b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.exe
Resource
win7-20220223-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/943405830781427732/bWrTiH0DBogSkJQzwQGoq_flifTRESk2r9Ezawioxg9zPGU0YKxSBP93A3sfQaAMshgX
Targets
-
-
Target
b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.bin
-
Size
274KB
-
MD5
1774b03fe04c0912378903346f6d807a
-
SHA1
33fbaeeb05bfe3e985af80a4f400dbc236fa51bd
-
SHA256
b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b
-
SHA512
8a76d27bc58ccc481bbdaa726483bf84b8a5c3e6512b6259a26b64fffea697900edc1efe5405c9b6a6ac61fbcc8bc0653b506692dde7f1c1251692595bd4aec0
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-