General
-
Target
0x00300000000139f5-5.dat
-
Size
251KB
-
Sample
231126-a4bp7sea8s
-
MD5
513286e3e241f1c93556f45db4f8dc23
-
SHA1
32c83261b6ac5663e91664764aab429e6cd424d1
-
SHA256
a46070cb169ed0754c0fb624ad29f59fbc66fb75df9d2b3daefda76bc0d0d893
-
SHA512
890a2d7a72cf9975ebd716ad3c6f05f595afd1218106054c3c33ff1b9d41baf52c0013b8f65d975d372151b3303311f6554cb412fbcbbb0cf01dc8e81109f693
-
SSDEEP
3072:CF7zU2iSjjusPFspsXuZgPBU13oNod6bc82hfZRO6FYSZUjBs8R5JCXfhI/KQ73h:azUyjHsmPBUqN26bjYRrFYSeprZ
Behavioral task
behavioral1
Sample
0x00300000000139f5-5.exe
Resource
win7-20231023-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1162710207558852689/c241__Tv-C5fSE0jsivUVIhYUTy9AQG_2q-Wedc4i61WcTidBFF8dAoQzbri3Cz5u5KI
Targets
-
-
Target
0x00300000000139f5-5.dat
-
Size
251KB
-
MD5
513286e3e241f1c93556f45db4f8dc23
-
SHA1
32c83261b6ac5663e91664764aab429e6cd424d1
-
SHA256
a46070cb169ed0754c0fb624ad29f59fbc66fb75df9d2b3daefda76bc0d0d893
-
SHA512
890a2d7a72cf9975ebd716ad3c6f05f595afd1218106054c3c33ff1b9d41baf52c0013b8f65d975d372151b3303311f6554cb412fbcbbb0cf01dc8e81109f693
-
SSDEEP
3072:CF7zU2iSjjusPFspsXuZgPBU13oNod6bc82hfZRO6FYSZUjBs8R5JCXfhI/KQ73h:azUyjHsmPBUqN26bjYRrFYSeprZ
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-