General
-
Target
66721cc45af725f154418a09d4a68ec6
-
Size
747KB
-
Sample
231222-fcc2vagbc3
-
MD5
66721cc45af725f154418a09d4a68ec6
-
SHA1
632a75f4263174cc19942a144fc7087b00b5486e
-
SHA256
0ea8e2910cb2a2a4b11be49d5e126ee142006b8081835e0a7df915d7888298ba
-
SHA512
dfa77713a46330fec13af7a613713920a0d20ba6ab29fff636c0ce0bfdec4d618f078dbd1ec3b84dd68199275d05d26cce9daf2b2fdfad234e842b01e1911cbd
-
SSDEEP
12288:VhqxSLo5C1Ps4XhWT+trB8lUvGNVB6d/30BPU54PaklHqs:VHLmCiIhjjGvcdclU5kbp
Static task
static1
Behavioral task
behavioral1
Sample
66721cc45af725f154418a09d4a68ec6.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/882699814805061663/t2OYL-mIrPiqG-u99L6kOBVeFW3ZztNOFcMlV1t3d2KjSF7XPZFr5kxG0S2tgFW28GHF
Targets
-
-
Target
66721cc45af725f154418a09d4a68ec6
-
Size
747KB
-
MD5
66721cc45af725f154418a09d4a68ec6
-
SHA1
632a75f4263174cc19942a144fc7087b00b5486e
-
SHA256
0ea8e2910cb2a2a4b11be49d5e126ee142006b8081835e0a7df915d7888298ba
-
SHA512
dfa77713a46330fec13af7a613713920a0d20ba6ab29fff636c0ce0bfdec4d618f078dbd1ec3b84dd68199275d05d26cce9daf2b2fdfad234e842b01e1911cbd
-
SSDEEP
12288:VhqxSLo5C1Ps4XhWT+trB8lUvGNVB6d/30BPU54PaklHqs:VHLmCiIhjjGvcdclU5kbp
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-