General
-
Target
icode.exe
-
Size
274KB
-
Sample
240229-yl7a6abd35
-
MD5
7fefc276f2e1ae851bef2b3be49ffa83
-
SHA1
083df00bb408f94805ec1e9cfa70c95cccf1b4c7
-
SHA256
b6d903a6675cad3991fc497696dd68fd108d835f577c2f97142593c2871461c7
-
SHA512
4dd1b172b78b444a8a6ca6b3d5987dba30b85600eb97feb6e2ad90288e1d8fc7c1e49be0b9565bbf23ef4f8236e16407f6f671351f4ebc4604ae00bf3f592d7b
-
SSDEEP
6144:5f+BLtABPDMtBBfn1Y0gIoHOQpafTyclI1D03e7:+tVvgIoHOOR1DF7
Behavioral task
behavioral1
Sample
icode.exe
Resource
win7-20240221-en
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/1177318846365978644/WqRVEpWYXkvEShUxMDfFChXP4hGQTeq-WCw7kZXxlaQ3h4sSnNIoFPbGdna5FGYOsBPj
Targets
-
-
Target
icode.exe
-
Size
274KB
-
MD5
7fefc276f2e1ae851bef2b3be49ffa83
-
SHA1
083df00bb408f94805ec1e9cfa70c95cccf1b4c7
-
SHA256
b6d903a6675cad3991fc497696dd68fd108d835f577c2f97142593c2871461c7
-
SHA512
4dd1b172b78b444a8a6ca6b3d5987dba30b85600eb97feb6e2ad90288e1d8fc7c1e49be0b9565bbf23ef4f8236e16407f6f671351f4ebc4604ae00bf3f592d7b
-
SSDEEP
6144:5f+BLtABPDMtBBfn1Y0gIoHOQpafTyclI1D03e7:+tVvgIoHOOR1DF7
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-