General
-
Target
40e3881d6c0898f6a5c24940b54a69a2.bin
-
Size
111KB
-
Sample
231011-ztbpwseg92
-
MD5
93173ab8f2835a314e2cdfd2232d7abe
-
SHA1
f9e1f81a4200f24dccef81f8fc94d6ed246f2cbb
-
SHA256
4ea469510ab54fc467022a806c7a88f739412f48f9d432f8c93202199174aa09
-
SHA512
e9f1852b72206c7cb7f048d38c8a8e6739814fbc01231fce8a6ab468ade8a9de7698608125eb17977ef34ee841e10defcddedb12258bac44321b196176ffdbb2
-
SSDEEP
1536:G/SiV4V7QREcZwBHxMNdkG3A+SfEXBA0C9ySQF/Ze58qpTpGNQdZISm0CEIi/y3K:edVvECwtxMNdk+rSfPPQ/ZVKcICEIi/N
Behavioral task
behavioral1
Sample
d5c05da57fa20048e35e6ef498b3dd0bcb92eaea3997e8a7009b38b8a15c4e86.exe
Resource
win7-20230831-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1155120137612034188/cdy5wHbWmzOOyiX6nZbn5OlBuBidB8er7f1281hl7JRUP1iVFGnh9s57SwGqJtsdtgrx
Targets
-
-
Target
d5c05da57fa20048e35e6ef498b3dd0bcb92eaea3997e8a7009b38b8a15c4e86.exe
-
Size
274KB
-
MD5
40e3881d6c0898f6a5c24940b54a69a2
-
SHA1
f3da392ee4fb703255eff7ee8a83f23c2bb02987
-
SHA256
d5c05da57fa20048e35e6ef498b3dd0bcb92eaea3997e8a7009b38b8a15c4e86
-
SHA512
9013a696cda9be776f0a5ee66aece8716662121e69c5be056c8567eabed8fea91641e50714962438efb57da1b1ff1d4a2c3211e65be10a9e7833e647f700eb8b
-
SSDEEP
6144:ef+BLtABPDMtBBfn1Y0gIoHOQZafTy8lI1D0Cbg:1tVvgIoHO+x1DRg
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-