General
-
Target
inside3.exe
-
Size
282KB
-
Sample
220314-zj49fsccc8
-
MD5
0238e5a4b41c4dcff77e8b01e88bed22
-
SHA1
9c265d639104a538f708d5aaef6fcb9b61a8048f
-
SHA256
a63d0da5401d3f5d28a9e8ac8c6a6fe7ba7eb7b1e1e60d1ec47a3eb7dd079808
-
SHA512
4add1b607fdfd4159745a7ed1fb02543ce210b9e36996ea404c05fc491bce2471c452cbf0aad3de0b1f1f563ca23f843ef77d9d85ffc6828b6924c4fa34b4bac
Static task
static1
Behavioral task
behavioral1
Sample
inside3.exe
Resource
win7-20220311-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/943188844625428520/64LwO5Gsh0pUZCcm80BNwTcVPihRnEmr1rZOPj02k6T5sRc5Lq4sdaB2KyttNgJHeX3T
Targets
-
-
Target
inside3.exe
-
Size
282KB
-
MD5
0238e5a4b41c4dcff77e8b01e88bed22
-
SHA1
9c265d639104a538f708d5aaef6fcb9b61a8048f
-
SHA256
a63d0da5401d3f5d28a9e8ac8c6a6fe7ba7eb7b1e1e60d1ec47a3eb7dd079808
-
SHA512
4add1b607fdfd4159745a7ed1fb02543ce210b9e36996ea404c05fc491bce2471c452cbf0aad3de0b1f1f563ca23f843ef77d9d85ffc6828b6924c4fa34b4bac
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-