General
-
Target
b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac.bin
-
Size
441KB
-
Sample
220301-wtql9scfek
-
MD5
292539bb44b33a26b14d7765695159d3
-
SHA1
6a17fdbf8ef8351ffe2ff67b4159ca69ddd48f28
-
SHA256
b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac
-
SHA512
a86a7c3183235a8a5371cc51f1b82373e9e8060df9beccedadf3fb8efab96d9b486ae50b6a601ce07c727a2035f043a574d736f2811c2485441bb3083dfbb516
Static task
static1
Behavioral task
behavioral1
Sample
b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac.exe
Resource
win7-20220223-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/941047365631086602/V3bLg4Oq1PpqS0I4y0Iau7A7FmfvU9HodJZUfZspA0qYOBb5-PV3byaM7skOT24w1CCR
Targets
-
-
Target
b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac.bin
-
Size
441KB
-
MD5
292539bb44b33a26b14d7765695159d3
-
SHA1
6a17fdbf8ef8351ffe2ff67b4159ca69ddd48f28
-
SHA256
b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac
-
SHA512
a86a7c3183235a8a5371cc51f1b82373e9e8060df9beccedadf3fb8efab96d9b486ae50b6a601ce07c727a2035f043a574d736f2811c2485441bb3083dfbb516
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-