General
-
Target
kamidere.exe
-
Size
1.2MB
-
Sample
230907-x5ws4ade47
-
MD5
7459066f56619d7465110e5cf08bf7ff
-
SHA1
cb2a865d3e3af9d17a30ec4957e564edfef657d1
-
SHA256
2f82f381e01d7c089f5af5a95a1d276cd349c3da56fc985024d8c5af17552d91
-
SHA512
07fb16334aee0388501410f89fa2c3e26641aa87234d32bb8de30f14d7cd4228a5792b39b775651d814cda314e78f0a01c2cfef8ae938d6dd42398ca2711b986
-
SSDEEP
24576:BKJdi3xR7XX9NqdzkFxSEAuc3lKaMhzKukuYuC+:BCo3L7H9Md4FxSEAuj5MuC+
Static task
static1
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1144111485715484692/W6-NrreN9sCTG1sx1mo0d2yLoDwfNnpdsyMarNWNlT4kgWHDWvgWC3whzPnqr8RkjttM
Targets
-
-
Target
kamidere.exe
-
Size
1.2MB
-
MD5
7459066f56619d7465110e5cf08bf7ff
-
SHA1
cb2a865d3e3af9d17a30ec4957e564edfef657d1
-
SHA256
2f82f381e01d7c089f5af5a95a1d276cd349c3da56fc985024d8c5af17552d91
-
SHA512
07fb16334aee0388501410f89fa2c3e26641aa87234d32bb8de30f14d7cd4228a5792b39b775651d814cda314e78f0a01c2cfef8ae938d6dd42398ca2711b986
-
SSDEEP
24576:BKJdi3xR7XX9NqdzkFxSEAuc3lKaMhzKukuYuC+:BCo3L7H9Md4FxSEAuj5MuC+
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-