General
-
Target
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.bin
-
Size
793KB
-
Sample
220301-wtyb4scfep
-
MD5
f559e77721d8cc5bd97e037c4b3472cc
-
SHA1
f6dda6d685285301e23fd51338d0977fb5e03a6e
-
SHA256
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d
-
SHA512
64d6e8d0bc9862f9eab80d0fa95fdbb42eab44efed4a90abe1a6a0c8b1a308b5940d90740beb211dd6c375b8dd1fb1706a76f484ccf439cfc3bb2ae0aacb3dd9
Static task
static1
Behavioral task
behavioral1
Sample
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.exe
Resource
win7-20220223-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/939927794656370699/MQUodH1jMxGoELXDI7vt3uVKvZAZN_FBkYRFlTiMVxHGCFnEzvPC7JNVH8-ESePeneQo
Targets
-
-
Target
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.bin
-
Size
793KB
-
MD5
f559e77721d8cc5bd97e037c4b3472cc
-
SHA1
f6dda6d685285301e23fd51338d0977fb5e03a6e
-
SHA256
c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d
-
SHA512
64d6e8d0bc9862f9eab80d0fa95fdbb42eab44efed4a90abe1a6a0c8b1a308b5940d90740beb211dd6c375b8dd1fb1706a76f484ccf439cfc3bb2ae0aacb3dd9
-
Executes dropped EXE
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-