General
-
Target
6e4b2af9613621fcf93169e9e675a83d
-
Size
1.2MB
-
Sample
240122-a9yrxschfq
-
MD5
6e4b2af9613621fcf93169e9e675a83d
-
SHA1
c73f05cc03da6fae9d02dae5c27a39ad27e614f8
-
SHA256
699f85530a90e3aa36ff9e89dd99eb80c9c183e5b4051f05563519207a6f43f1
-
SHA512
35a8322abfa612c2e26f1ba182ac9ec329d52f64d0e65957ab75e6e9e8c4b91f12dc7b654e63bcb635ed76cbae4a99c9cc3474ef68c447cb8b53a3f530e1130b
-
SSDEEP
24576:BxvZEnWSE8QUvZE7ip4eTIFKEEHpded5mdKv1rVewecDM:BxvZEWeQuE7Mbpd4mqrJDM
Static task
static1
Behavioral task
behavioral1
Sample
6e4b2af9613621fcf93169e9e675a83d.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://ptb.discord.com/api/webhooks/860353023338086430/2Qd4HlzQHur0rzkKBP2Vm6f3rps1M95uCLN9BFhgxoNcoNZaddzQ1WGM0rfQd1x1RjdF
Targets
-
-
Target
6e4b2af9613621fcf93169e9e675a83d
-
Size
1.2MB
-
MD5
6e4b2af9613621fcf93169e9e675a83d
-
SHA1
c73f05cc03da6fae9d02dae5c27a39ad27e614f8
-
SHA256
699f85530a90e3aa36ff9e89dd99eb80c9c183e5b4051f05563519207a6f43f1
-
SHA512
35a8322abfa612c2e26f1ba182ac9ec329d52f64d0e65957ab75e6e9e8c4b91f12dc7b654e63bcb635ed76cbae4a99c9cc3474ef68c447cb8b53a3f530e1130b
-
SSDEEP
24576:BxvZEnWSE8QUvZE7ip4eTIFKEEHpded5mdKv1rVewecDM:BxvZEWeQuE7Mbpd4mqrJDM
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-