General
-
Target
6618325d64a870040b82fb73575ee669.bin
-
Size
1.5MB
-
Sample
240120-cl26jshgak
-
MD5
6618325d64a870040b82fb73575ee669
-
SHA1
5a7a92a76a832d7a5fc37577af8ebb7078cff6e2
-
SHA256
8298df16c667b88f524bf2cbb79c7f1122fe0f1c95502c5a4e37fa69999affcb
-
SHA512
641e2c1b6b4c0d1efa590511ead2f46154367a6a9a0a7ac3b7791e2f285214bd8b7ed2309b5c5e59c66475931a2f5245268f99e44f820ecd2bedbb2f6bd233c9
-
SSDEEP
24576:JhvJVJdMJ7uLp3iEOwnBYnRIOzm3QHxumDWsWT+T6kcfTj4WEs4x8Ka23x:x3dXLp3iEOwnk8BmDCTdkcojxpx
Static task
static1
Behavioral task
behavioral1
Sample
6618325d64a870040b82fb73575ee669.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/866738169181372456/leUwW_rAYekiwOVhgk8WOe6mYy271-wPgyPdfdgGkW3LvRIrgaePX3yC-m_SGyjcPYeJ
Targets
-
-
Target
6618325d64a870040b82fb73575ee669.bin
-
Size
1.5MB
-
MD5
6618325d64a870040b82fb73575ee669
-
SHA1
5a7a92a76a832d7a5fc37577af8ebb7078cff6e2
-
SHA256
8298df16c667b88f524bf2cbb79c7f1122fe0f1c95502c5a4e37fa69999affcb
-
SHA512
641e2c1b6b4c0d1efa590511ead2f46154367a6a9a0a7ac3b7791e2f285214bd8b7ed2309b5c5e59c66475931a2f5245268f99e44f820ecd2bedbb2f6bd233c9
-
SSDEEP
24576:JhvJVJdMJ7uLp3iEOwnBYnRIOzm3QHxumDWsWT+T6kcfTj4WEs4x8Ka23x:x3dXLp3iEOwnk8BmDCTdkcojxpx
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-