General
-
Target
940edb1275d4f4590edf64e0889abf61
-
Size
1.2MB
-
Sample
240206-hctqpshfb6
-
MD5
940edb1275d4f4590edf64e0889abf61
-
SHA1
5e699c98a7b9b1d3793611cdc45c560009685c2e
-
SHA256
8b655a359fe66cd0031fa38ec2a03a0dd4b35b2da18684bc8359b4f1fa3fd293
-
SHA512
cd385744913dcb4b7a99854cca69cd61e4b65fdf1463925b0545d8e7e5b454852cc68ae959aa68f4fa69263ec982364ce417f02e834078eb00f27902729000c2
-
SSDEEP
24576:ehiER2uLDwQ9Zs26ZF6Hc2fKWm9is3Y0boUTCJ:cpT3w9rY8qKWj4Y05y
Static task
static1
Behavioral task
behavioral1
Sample
940edb1275d4f4590edf64e0889abf61.exe
Resource
win7-20231129-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/879339962309431326/Wo1u0LeBvuiTt_6vlQvfVfGtacXotCWzUOhH9TiugxqILQ5I6innKzyZKFua1L-0k0dx
Targets
-
-
Target
940edb1275d4f4590edf64e0889abf61
-
Size
1.2MB
-
MD5
940edb1275d4f4590edf64e0889abf61
-
SHA1
5e699c98a7b9b1d3793611cdc45c560009685c2e
-
SHA256
8b655a359fe66cd0031fa38ec2a03a0dd4b35b2da18684bc8359b4f1fa3fd293
-
SHA512
cd385744913dcb4b7a99854cca69cd61e4b65fdf1463925b0545d8e7e5b454852cc68ae959aa68f4fa69263ec982364ce417f02e834078eb00f27902729000c2
-
SSDEEP
24576:ehiER2uLDwQ9Zs26ZF6Hc2fKWm9is3Y0boUTCJ:cpT3w9rY8qKWj4Y05y
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-