General
-
Target
5e3b448a401c6b9662d1e3d0d5cb2143
-
Size
2.7MB
-
Sample
240115-17442afhdk
-
MD5
5e3b448a401c6b9662d1e3d0d5cb2143
-
SHA1
f290401040a78886975024e54b9e53d20169563d
-
SHA256
a2119eeffe066d388268d02e56303423b8ec267efae306609c1b316dc0c04cab
-
SHA512
677aba5e6ec76d3e21242638b0f31eb5ff4351c7fa14676d0ed87ac8c999552ef02de7423e5acd8bbdc9d43fcd45ff1330151d29f685ef0319e038d63dbd4cba
-
SSDEEP
49152:Izosmx2LWrn4StMIlux28xPmXtNMGi72arIPR5pl20hukH5jE9PlU/goROD+e8WD:zZnr4yRl6xPmXtNML7zA12OFHMNU/bRW
Behavioral task
behavioral1
Sample
5e3b448a401c6b9662d1e3d0d5cb2143.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/877099784312328213/gbN3AhFr-HwOYeSmi-AjLnTIHhnG8GV5LfjEhIncHO-_rtFM2jafytOi5GkZCyhMgXTd
Targets
-
-
Target
5e3b448a401c6b9662d1e3d0d5cb2143
-
Size
2.7MB
-
MD5
5e3b448a401c6b9662d1e3d0d5cb2143
-
SHA1
f290401040a78886975024e54b9e53d20169563d
-
SHA256
a2119eeffe066d388268d02e56303423b8ec267efae306609c1b316dc0c04cab
-
SHA512
677aba5e6ec76d3e21242638b0f31eb5ff4351c7fa14676d0ed87ac8c999552ef02de7423e5acd8bbdc9d43fcd45ff1330151d29f685ef0319e038d63dbd4cba
-
SSDEEP
49152:Izosmx2LWrn4StMIlux28xPmXtNMGi72arIPR5pl20hukH5jE9PlU/goROD+e8WD:zZnr4yRl6xPmXtNML7zA12OFHMNU/bRW
-
Detects Echelon Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-