General
-
Target
736a9be813a4658c3175082adfac608e
-
Size
1.1MB
-
Sample
240125-b8gmpaeaep
-
MD5
736a9be813a4658c3175082adfac608e
-
SHA1
8f1cced332b2faa62f4574a81a44ba35e4493730
-
SHA256
69ced06ad3bc263adc214a2c2a3c14169cc8f1ffd1d9878ce8cb6daa46124610
-
SHA512
810434e369b4d6c01952ec80990c0548159c3637b9347b1578b08705fefa6a6dfde4f6d58cb2c337a322c962903b4e23ee64358704c2ee9cf5343ed91e9b59ca
-
SSDEEP
24576:BiSvJKfOVWGK+PvpWuiWIp28LjUbXm13aqejgcegXTlMf8Bxq:JKfIG+PvpWhiXm13aN5XZ
Behavioral task
behavioral1
Sample
736a9be813a4658c3175082adfac608e.exe
Resource
win7-20231129-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/864993390039138344/KcIraJ14D-c_gxt8b62QhfVu_PGaoIgxX5A9WLR2Iw9WLUoF8VGIsnRR969mXFvP0Unf
Targets
-
-
Target
736a9be813a4658c3175082adfac608e
-
Size
1.1MB
-
MD5
736a9be813a4658c3175082adfac608e
-
SHA1
8f1cced332b2faa62f4574a81a44ba35e4493730
-
SHA256
69ced06ad3bc263adc214a2c2a3c14169cc8f1ffd1d9878ce8cb6daa46124610
-
SHA512
810434e369b4d6c01952ec80990c0548159c3637b9347b1578b08705fefa6a6dfde4f6d58cb2c337a322c962903b4e23ee64358704c2ee9cf5343ed91e9b59ca
-
SSDEEP
24576:BiSvJKfOVWGK+PvpWuiWIp28LjUbXm13aqejgcegXTlMf8Bxq:JKfIG+PvpWhiXm13aN5XZ
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1