General
-
Target
0x000a0000000122c9-5.dat
-
Size
534KB
-
Sample
240217-ymr8maad71
-
MD5
0ce3051b867d50aa172d1b332f156e3e
-
SHA1
f87defe312cb3a5efea3f845d187762e153bddab
-
SHA256
5ac29f18472f943f2eb3c256fdbfe251b04ca66afc22fcba65183b0509feb529
-
SHA512
5169a3acd3c79cc4d22bf3a1f4d9770797d2c31503bab1022a153ad56c382e495de2ce06a8a04b3bb4b2fb2c666575dcdefa26533ff5affc4b6ce126e2166193
-
SSDEEP
6144:ef+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGG/5zJRb2IXe05f4VGWWxjdq:d161eO5rbHHsYqTXGOXXe+4k8
Behavioral task
behavioral1
Sample
0x000a0000000122c9-5.exe
Resource
win7-20231215-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1199323175729758268/CBdP8e3cXbL0ED8xKBhMw0ikKHmITu-6CI4WjfttZm2aWGZGjp43Msrjwp8AVeEBf6T1
Targets
-
-
Target
0x000a0000000122c9-5.dat
-
Size
534KB
-
MD5
0ce3051b867d50aa172d1b332f156e3e
-
SHA1
f87defe312cb3a5efea3f845d187762e153bddab
-
SHA256
5ac29f18472f943f2eb3c256fdbfe251b04ca66afc22fcba65183b0509feb529
-
SHA512
5169a3acd3c79cc4d22bf3a1f4d9770797d2c31503bab1022a153ad56c382e495de2ce06a8a04b3bb4b2fb2c666575dcdefa26533ff5affc4b6ce126e2166193
-
SSDEEP
6144:ef+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGG/5zJRb2IXe05f4VGWWxjdq:d161eO5rbHHsYqTXGOXXe+4k8
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-