General
-
Target
cheat-engine-7-404.exe
-
Size
3.0MB
-
Sample
220519-ttn3bshed4
-
MD5
cdc4636a35c109b43f2898e13e8dc666
-
SHA1
1c0807042275593c79da97799153b72929dfb2d8
-
SHA256
347899570bba1cbaa4fe9149d71b7e2e07ea2d930d1bcb9e5762b242dd017887
-
SHA512
9498fd4c2fc65ae0b1294f4d37f6a0df50d92ffd9709f79ffd9606add19962c7493f68dc7f279e398fecf68d2b57f0f87db5f4d2e7df3f31364cce26dbd0e4ef
Static task
static1
Behavioral task
behavioral1
Sample
cheat-engine-7-404.exe
Resource
win7-20220414-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/973294177112686612/4QUQSbqvdZZd-DqEn3jQ1gWfu67yolKc4k1__wufBB-BWQv0dBmUKe8-IpUD-6DotJiV
Targets
-
-
Target
cheat-engine-7-404.exe
-
Size
3.0MB
-
MD5
cdc4636a35c109b43f2898e13e8dc666
-
SHA1
1c0807042275593c79da97799153b72929dfb2d8
-
SHA256
347899570bba1cbaa4fe9149d71b7e2e07ea2d930d1bcb9e5762b242dd017887
-
SHA512
9498fd4c2fc65ae0b1294f4d37f6a0df50d92ffd9709f79ffd9606add19962c7493f68dc7f279e398fecf68d2b57f0f87db5f4d2e7df3f31364cce26dbd0e4ef
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-