General
-
Target
48ad7db5fb10dd9b1c6817d5a9c34865
-
Size
2.2MB
-
Sample
231226-bn2r5abdb2
-
MD5
48ad7db5fb10dd9b1c6817d5a9c34865
-
SHA1
2fd68670f13f6335a2361fbdd7ed6c36b9f4863c
-
SHA256
44cf30bb3e4623c4374ab4132bd419d3a63f119b36eaf66f1a5258e36df3b60a
-
SHA512
7782826d586098b94e2c10a801881e0104784406d9d496c98b2932a33b28f2b0724be7eb25f158223f84483795b4bb768f7e2ad15799c9cb4b2577888909c3fb
-
SSDEEP
49152:pSezyzdsk+1US6FOZyj2Zi8kwUP+9uNMYuv+ShQFZS:pSdsk+ySemg2Iw0+YChv+Shx
Static task
static1
Behavioral task
behavioral1
Sample
48ad7db5fb10dd9b1c6817d5a9c34865.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/850985103400108043/qMVlcxRCEtOy4d0lLo-ckGGqIgWka8O5mwrGC7NwW7qRJs5beglorhRUk-uRy4jQ1Cbz
Targets
-
-
Target
48ad7db5fb10dd9b1c6817d5a9c34865
-
Size
2.2MB
-
MD5
48ad7db5fb10dd9b1c6817d5a9c34865
-
SHA1
2fd68670f13f6335a2361fbdd7ed6c36b9f4863c
-
SHA256
44cf30bb3e4623c4374ab4132bd419d3a63f119b36eaf66f1a5258e36df3b60a
-
SHA512
7782826d586098b94e2c10a801881e0104784406d9d496c98b2932a33b28f2b0724be7eb25f158223f84483795b4bb768f7e2ad15799c9cb4b2577888909c3fb
-
SSDEEP
49152:pSezyzdsk+1US6FOZyj2Zi8kwUP+9uNMYuv+ShQFZS:pSdsk+ySemg2Iw0+YChv+Shx
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-