General
-
Target
b590138675ad5aa75e4753edfebab622
-
Size
1.4MB
-
Sample
240305-yy1zxahb72
-
MD5
b590138675ad5aa75e4753edfebab622
-
SHA1
124eec668e6dc1bd1e4908089f5c874fd1a45937
-
SHA256
9a3116e6c3d151a200859719980ee4cf2487217562312757b754774d266ca5b8
-
SHA512
3f038e7dd129da5a2842abf7d37969e82ed9d30e89d611e8ca1f5b86098f4a8e6ae719826cabc43641bd5bd6cb047ad967ce8ae293f760755f64f5cae9370b9d
-
SSDEEP
24576:4vNIdb2DCPejfNy2Xp5nJdyEgBvKyNCkOxTsVTIAq2G4vXuQU5v8vJHLZRFe7JFf:8Nwb2uWJy2Xp5J4hRzNDaYIGGIXuQ8Q4
Static task
static1
Behavioral task
behavioral1
Sample
b590138675ad5aa75e4753edfebab622.exe
Resource
win7-20240221-en
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/873463242905755648/toN0X9zZYgcbFlkZ7jCqLk4I_sGhgsbHl5HJ9jgcfMn_Sw0HRHJneP9bBZz01msNSKLJ
Targets
-
-
Target
b590138675ad5aa75e4753edfebab622
-
Size
1.4MB
-
MD5
b590138675ad5aa75e4753edfebab622
-
SHA1
124eec668e6dc1bd1e4908089f5c874fd1a45937
-
SHA256
9a3116e6c3d151a200859719980ee4cf2487217562312757b754774d266ca5b8
-
SHA512
3f038e7dd129da5a2842abf7d37969e82ed9d30e89d611e8ca1f5b86098f4a8e6ae719826cabc43641bd5bd6cb047ad967ce8ae293f760755f64f5cae9370b9d
-
SSDEEP
24576:4vNIdb2DCPejfNy2Xp5nJdyEgBvKyNCkOxTsVTIAq2G4vXuQU5v8vJHLZRFe7JFf:8Nwb2uWJy2Xp5J4hRzNDaYIGGIXuQ8Q4
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-