General
-
Target
ed29dcde8768f1e4c759486140c338cd.exe
-
Size
3.9MB
-
Sample
240109-w5q26sgga7
-
MD5
ed29dcde8768f1e4c759486140c338cd
-
SHA1
d721f6ca0615b83fb541fc7600c026ad0a8c1e1d
-
SHA256
9fa20d35011ed9990b8df980830bb843d262a305dac9e22c75780e8f76f58efe
-
SHA512
953675610a166f8dbb6423194aa205d75c43ae4ba312540d8ea25b9f48644f35026f62ed61b2660f9597e8f4bf8f2f0447b08b8686d2e52a1edc0326dfdd0bc1
-
SSDEEP
98304:JngRc3P5083Yf+hW1jfN2C0GnijlUME/w00xpw7V:met3+l9N2GQqME4jEV
Static task
static1
Behavioral task
behavioral1
Sample
ed29dcde8768f1e4c759486140c338cd.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/854662966200762408/UEPTBr2Rw2bbBl8kdAtd687oxi7BxJ7RDU99BRreTgVoN7lgDrh84_ew6GVD5oxR2dPt
Targets
-
-
Target
ed29dcde8768f1e4c759486140c338cd.exe
-
Size
3.9MB
-
MD5
ed29dcde8768f1e4c759486140c338cd
-
SHA1
d721f6ca0615b83fb541fc7600c026ad0a8c1e1d
-
SHA256
9fa20d35011ed9990b8df980830bb843d262a305dac9e22c75780e8f76f58efe
-
SHA512
953675610a166f8dbb6423194aa205d75c43ae4ba312540d8ea25b9f48644f35026f62ed61b2660f9597e8f4bf8f2f0447b08b8686d2e52a1edc0326dfdd0bc1
-
SSDEEP
98304:JngRc3P5083Yf+hW1jfN2C0GnijlUME/w00xpw7V:met3+l9N2GQqME4jEV
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-