General
-
Target
2eb2782cc346b73b7180e3e9a220041c
-
Size
9.3MB
-
Sample
231231-j49rnsfbhl
-
MD5
2eb2782cc346b73b7180e3e9a220041c
-
SHA1
b5d7dbb4f29e2567f9e4d67a9d64d7034ff5a968
-
SHA256
3220df74888873a8f81e0bde3f4743c25f908bf0c97b768863b67d8d78867425
-
SHA512
5124335f1362a836dd6f539052f705e64d080fc640abaf489c2407b819de9e79740ca0d5cc8a32310acecdd5e6a6076d83cb4cb7d013fc82b49b060c2b67dec9
-
SSDEEP
196608:DzB+082zIZNrOYyPugEl4ZXni32eZ3WU5QR6kj09F1lThXBhc+YX7:DzB+GeN/y2jl4N+2KWVR6u0P1l3Sj
Static task
static1
Behavioral task
behavioral1
Sample
2eb2782cc346b73b7180e3e9a220041c.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/868513655556292688/7ViWQKXofSCTi8VWoHEcGeQK61RUEBYfnsE72cu6TJnpHYwlgzbrVI5gQn_jpfUMFoS5
Targets
-
-
Target
2eb2782cc346b73b7180e3e9a220041c
-
Size
9.3MB
-
MD5
2eb2782cc346b73b7180e3e9a220041c
-
SHA1
b5d7dbb4f29e2567f9e4d67a9d64d7034ff5a968
-
SHA256
3220df74888873a8f81e0bde3f4743c25f908bf0c97b768863b67d8d78867425
-
SHA512
5124335f1362a836dd6f539052f705e64d080fc640abaf489c2407b819de9e79740ca0d5cc8a32310acecdd5e6a6076d83cb4cb7d013fc82b49b060c2b67dec9
-
SSDEEP
196608:DzB+082zIZNrOYyPugEl4ZXni32eZ3WU5QR6kj09F1lThXBhc+YX7:DzB+GeN/y2jl4N+2KWVR6u0P1l3Sj
-
XMRig Miner payload
-
Stops running service(s)
-
Executes dropped EXE
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-