General
-
Target
705927ee5d2f040542d751bf7fdc9507
-
Size
3.2MB
-
Sample
231219-wkavfshecm
-
MD5
705927ee5d2f040542d751bf7fdc9507
-
SHA1
af6d69dc1f71db1a1665d9cf2f0244ba66af09f0
-
SHA256
a02597bfc372534884c7ce8bcab08d0c09c3d52cd8eef83b9b90115bc97a402c
-
SHA512
507403aa3bcdb02778e19efb3bd2b0c12bb6d2a7e0a0d86c0e09c0891e873e26551b169fc5178675fbe5e80784d07a50296d8b5719192df8847b9bf0e9644409
-
SSDEEP
98304:Rv2SvaBNcLJgOhxEZv140mwijiXQjv4Fg:0AyNcmsE/4hjiXQjgS
Behavioral task
behavioral1
Sample
705927ee5d2f040542d751bf7fdc9507.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/894942702326677514/imJ4lUzTMjTxjg87EEJcDzxrAj6U6amcp4yRwcfUvSVVePmrzxPj_IrqfdM_lnSBl-27
Targets
-
-
Target
705927ee5d2f040542d751bf7fdc9507
-
Size
3.2MB
-
MD5
705927ee5d2f040542d751bf7fdc9507
-
SHA1
af6d69dc1f71db1a1665d9cf2f0244ba66af09f0
-
SHA256
a02597bfc372534884c7ce8bcab08d0c09c3d52cd8eef83b9b90115bc97a402c
-
SHA512
507403aa3bcdb02778e19efb3bd2b0c12bb6d2a7e0a0d86c0e09c0891e873e26551b169fc5178675fbe5e80784d07a50296d8b5719192df8847b9bf0e9644409
-
SSDEEP
98304:Rv2SvaBNcLJgOhxEZv140mwijiXQjv4Fg:0AyNcmsE/4hjiXQjgS
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-