General
-
Target
brohack.exe
-
Size
303KB
-
Sample
240224-2p7ymsgh9z
-
MD5
5fbc498bf0281af7a003d76738adc0f7
-
SHA1
96a94cab468c5996b1a42732ad0983f69be45c35
-
SHA256
53dd67f00fea6509b437e697d5d9c0b21ce0b696842325f5310a9084c6cc3f88
-
SHA512
025662fd7ab97e0bb4bcb12072839b8a3ce79a951c43b371b9a88a734e2206c88ee8e9dba696216a643ac17dc7043c6efae47200864906e33197a5b0a1264742
-
SSDEEP
6144:bRlT6MDdbICydeBV9suqPmlF62c6bmA1D09lu:bRT4uqPmH6Vg1DQu
Behavioral task
behavioral1
Sample
brohack.exe
Resource
win7-20240221-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1209814880681463859/eV-PqCKGxfEhAj3f4ye1Dye3QnGKGcvqzlk_ma67nMX2y4MCq8PIBJYDQjaJzHmnQ3Ch
Targets
-
-
Target
brohack.exe
-
Size
303KB
-
MD5
5fbc498bf0281af7a003d76738adc0f7
-
SHA1
96a94cab468c5996b1a42732ad0983f69be45c35
-
SHA256
53dd67f00fea6509b437e697d5d9c0b21ce0b696842325f5310a9084c6cc3f88
-
SHA512
025662fd7ab97e0bb4bcb12072839b8a3ce79a951c43b371b9a88a734e2206c88ee8e9dba696216a643ac17dc7043c6efae47200864906e33197a5b0a1264742
-
SSDEEP
6144:bRlT6MDdbICydeBV9suqPmlF62c6bmA1D09lu:bRT4uqPmH6Vg1DQu
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-