General
-
Target
28805.jpg
-
Size
318KB
-
Sample
240219-zdfnxadc24
-
MD5
98292d50d2c53d6f735614e1b0b80536
-
SHA1
8e21b801a7164dc99256d4cb910f36d3e81dc4e2
-
SHA256
778e98a63909d17422bbb09478811d51acc4e790d29f91415b5c23865ce17a57
-
SHA512
8d56037ed6b41d779c88e504d47bcbe67fe24dec3b318a45b7888f49bfd12780456d45cc7af60eefa6849ce4f89c783dee009eaf04e97d08de6c0ca199234aa0
-
SSDEEP
6144:YUP06JN/MtcvKnlzxMhAHb2sqe6sgTUQkPzNd6xyJvDDZFpWC:Y2067o4Kdxj2e6s0jk5d6x0DtrX
Static task
static1
Behavioral task
behavioral1
Sample
28805.jpg
Resource
win10v2004-20231215-es
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1190173606152511488/v1OAiZaC9GzyANpZ3fPI4-Mslm0Mk61AqOUiFR2Q_-MR5K5dIUaPF9KM4ArYYdGUZVAh
Targets
-
-
Target
28805.jpg
-
Size
318KB
-
MD5
98292d50d2c53d6f735614e1b0b80536
-
SHA1
8e21b801a7164dc99256d4cb910f36d3e81dc4e2
-
SHA256
778e98a63909d17422bbb09478811d51acc4e790d29f91415b5c23865ce17a57
-
SHA512
8d56037ed6b41d779c88e504d47bcbe67fe24dec3b318a45b7888f49bfd12780456d45cc7af60eefa6849ce4f89c783dee009eaf04e97d08de6c0ca199234aa0
-
SSDEEP
6144:YUP06JN/MtcvKnlzxMhAHb2sqe6sgTUQkPzNd6xyJvDDZFpWC:Y2067o4Kdxj2e6s0jk5d6x0DtrX
Score10/10-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-