General
-
Target
15dbc954cd4f54abc55486ef11375fa6
-
Size
25.5MB
-
Sample
231230-mgf3mahbfn
-
MD5
15dbc954cd4f54abc55486ef11375fa6
-
SHA1
c671fac7354974f482b9852dfbd4c9204782f317
-
SHA256
1e71f322863511ac34ab0013f3740b1921a9756f4b326d2184a8f6159e61ccff
-
SHA512
f4988c3fe2d18cff76dd869e65c60b06c9943f88c92f29807ff6e29044f3a166e7b3c582793e1c1a56bb3e98e6c51edc85458ef809825fd694f15fec3bcf46ba
-
SSDEEP
786432:XLtc+xXgVxnovLYeLV1yhoyVOvgWWv7S4:5cUI49xHyQJ4
Behavioral task
behavioral1
Sample
15dbc954cd4f54abc55486ef11375fa6.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/870377028749242408/bsw2VmRGeiAIilnd9vwqpCOLMZO_5v4RLwcEnrTBTCpbNpQmrUG6iRNERPAwaRZbpXqc
Targets
-
-
Target
15dbc954cd4f54abc55486ef11375fa6
-
Size
25.5MB
-
MD5
15dbc954cd4f54abc55486ef11375fa6
-
SHA1
c671fac7354974f482b9852dfbd4c9204782f317
-
SHA256
1e71f322863511ac34ab0013f3740b1921a9756f4b326d2184a8f6159e61ccff
-
SHA512
f4988c3fe2d18cff76dd869e65c60b06c9943f88c92f29807ff6e29044f3a166e7b3c582793e1c1a56bb3e98e6c51edc85458ef809825fd694f15fec3bcf46ba
-
SSDEEP
786432:XLtc+xXgVxnovLYeLV1yhoyVOvgWWv7S4:5cUI49xHyQJ4
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-