General
-
Target
fe7fc1c78b51d7a796562e09b0695353
-
Size
5.1MB
-
Sample
231220-wjc87acfgp
-
MD5
fe7fc1c78b51d7a796562e09b0695353
-
SHA1
2df2d7b7edc5db2a94ad4428a7fd354650bfe49d
-
SHA256
24803b2f05f7eaa2d0d13c5655987459ef3ee8169d83be8c78683d70de95ddc0
-
SHA512
5d17f20a5a74aab071c5ee0cc98200d46487734dc899d9bae623ae34e5664aa0b315d9178cfee1b8500a3564197bcdd749e428c9832ba2a749e06d1ed2b22607
-
SSDEEP
98304:n4jbjW+MvAuGdozQQQYeclr+UiO58O72LHozpAsRS1FsQvsw0R:abjhxgHeclA08OAIzpRo1SN
Behavioral task
behavioral1
Sample
fe7fc1c78b51d7a796562e09b0695353.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/892778422043041873/gYqLiMf-cpigl0WIlIn8gWAFktijHzZBx8-bcU6yxyaLimlCeY0552wy36J78fXd1Na8
Targets
-
-
Target
fe7fc1c78b51d7a796562e09b0695353
-
Size
5.1MB
-
MD5
fe7fc1c78b51d7a796562e09b0695353
-
SHA1
2df2d7b7edc5db2a94ad4428a7fd354650bfe49d
-
SHA256
24803b2f05f7eaa2d0d13c5655987459ef3ee8169d83be8c78683d70de95ddc0
-
SHA512
5d17f20a5a74aab071c5ee0cc98200d46487734dc899d9bae623ae34e5664aa0b315d9178cfee1b8500a3564197bcdd749e428c9832ba2a749e06d1ed2b22607
-
SSDEEP
98304:n4jbjW+MvAuGdozQQQYeclr+UiO58O72LHozpAsRS1FsQvsw0R:abjhxgHeclA08OAIzpRo1SN
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-