Static task
static1
Behavioral task
behavioral1
Sample
ExternalRun.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
ExternalRun.exe
Resource
win10v2004-20220310-en
General
-
Target
ExternalRun.exe
-
Size
274KB
-
MD5
63525b6ba838d80f0eb16a666ff30de2
-
SHA1
b11d70bf65b2b82df2c4aa46ac9dfce3c308b568
-
SHA256
3c8acfa90eed5ab18fd669bea9d494d9fb96f964d9040ee03ff9889dbaada294
-
SHA512
0709a2bb5d23ede0347e684a6512f0c282de68e3e7f1800ea1544e2f737cd77333bb0a496f6a0489d32df60e7d37760225e1fcac8d9905ae1b84d3de8ee348eb
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/947512216133980311/ImHpeYlo_A0Yhi0saM66pMBO7iLHhGK_k5MBohq8Jg4tn4gMe7dTpw1qEItYNQR_c9kp
Signatures
-
44caliber family
-
Processes:
resource yara_rule sample Discord_wb -
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_DiscordURL
Files
-
ExternalRun.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ