General
-
Target
c5399cf4b380afdf4b7182c713757961ccb61c51c1f6f520c98afc6711a12d3b.bin
-
Size
274KB
-
Sample
220301-wtsfvscfem
-
MD5
58dda4f172222c41e87d2782a363b2bb
-
SHA1
9d5a8d0d9d97b95b7b0cca88ad48017941c7a4fc
-
SHA256
c5399cf4b380afdf4b7182c713757961ccb61c51c1f6f520c98afc6711a12d3b
-
SHA512
ef9da0e0b2fd1369cc54cf43baa1908e7349888c923edf8cc78cd1ad0fdee59f1c79692eeb9a627306b8b0be7cfde919a285af8bb5439353d209155b22790086
Static task
static1
Behavioral task
behavioral1
Sample
c5399cf4b380afdf4b7182c713757961ccb61c51c1f6f520c98afc6711a12d3b.exe
Resource
win7-en-20211208
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/942342705353199656/D1rXHNGPNVCZU4vJqkCF4OKJwQJyEuXiVGUHrdu885iCt3s776Mbhg0XMhQoPFRyERjg
Targets
-
-
Target
c5399cf4b380afdf4b7182c713757961ccb61c51c1f6f520c98afc6711a12d3b.bin
-
Size
274KB
-
MD5
58dda4f172222c41e87d2782a363b2bb
-
SHA1
9d5a8d0d9d97b95b7b0cca88ad48017941c7a4fc
-
SHA256
c5399cf4b380afdf4b7182c713757961ccb61c51c1f6f520c98afc6711a12d3b
-
SHA512
ef9da0e0b2fd1369cc54cf43baa1908e7349888c923edf8cc78cd1ad0fdee59f1c79692eeb9a627306b8b0be7cfde919a285af8bb5439353d209155b22790086
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-