General
-
Target
05665999.exe
-
Size
718KB
-
Sample
230607-pb4ylsaf5x
-
MD5
e5701891f96e5727971f223551b64f45
-
SHA1
dcc476ee7b6c9bb75195c1ab81512d5c6efacd40
-
SHA256
1a7c622544bc7fce75780a488bbf9d66a68176405c40d196a7afb7124244bd41
-
SHA512
2c8a44b882bce13e226ab0a7941c57a8b383c793626cf15a16e81abbcaa033b78a536cbeb03e2bdbd4c923102bb6d967f90e4cc38570fb2f5ebd32706da9e998
-
SSDEEP
12288:jccr2M0k0CTUxid6rfBCWxskGxo5PlAXY5sMIGH/c4j:IcpBjN6rfBCWmx42I5HIGfcY
Static task
static1
Behavioral task
behavioral1
Sample
05665999.exe
Resource
win7-20230220-en
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/1049356312187772968/RhGBI5VRUa2070gE61YTrZzr1G_QOPG0A5RvRIUDuTemlVPlposGOfVeFkkYgdFFQO5I
Targets
-
-
Target
05665999.exe
-
Size
718KB
-
MD5
e5701891f96e5727971f223551b64f45
-
SHA1
dcc476ee7b6c9bb75195c1ab81512d5c6efacd40
-
SHA256
1a7c622544bc7fce75780a488bbf9d66a68176405c40d196a7afb7124244bd41
-
SHA512
2c8a44b882bce13e226ab0a7941c57a8b383c793626cf15a16e81abbcaa033b78a536cbeb03e2bdbd4c923102bb6d967f90e4cc38570fb2f5ebd32706da9e998
-
SSDEEP
12288:jccr2M0k0CTUxid6rfBCWxskGxo5PlAXY5sMIGH/c4j:IcpBjN6rfBCWmx42I5HIGfcY
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-