General
-
Target
Auto Block.exe.vir
-
Size
2.2MB
-
Sample
220617-wmfhqachbm
-
MD5
006f5bbb2e6f9ce7d38edad078e753ba
-
SHA1
ae6bcb7f694bee6e52be7e7dc75a1d9ced78f75f
-
SHA256
98f61a34d1b53907d24096b09b5530b80ca42ce9dd4c50eafcc6fab3f45a0119
-
SHA512
f4e6aafe806fc71a728a500fa80cce83044bbe979252228b74e60b88f73ded979e917cbef1a987db176f323b6027298de102f4e867fb99ffe28c1b50d667bfff
Static task
static1
Behavioral task
behavioral1
Sample
Auto Block.exe
Resource
win7-20220414-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/987320469264928788/XHGBPVVk0PqB5Bug7qHP2xnrZN4CfIIFQe0thEyFCmF2MEQleEN98ae4oIo8Q6KdiaA_
Targets
-
-
Target
Auto Block.exe.vir
-
Size
2.2MB
-
MD5
006f5bbb2e6f9ce7d38edad078e753ba
-
SHA1
ae6bcb7f694bee6e52be7e7dc75a1d9ced78f75f
-
SHA256
98f61a34d1b53907d24096b09b5530b80ca42ce9dd4c50eafcc6fab3f45a0119
-
SHA512
f4e6aafe806fc71a728a500fa80cce83044bbe979252228b74e60b88f73ded979e917cbef1a987db176f323b6027298de102f4e867fb99ffe28c1b50d667bfff
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-