General
-
Target
b6a21ab39a7778dc807009a9cd23d82c
-
Size
943KB
-
Sample
240306-ga9hpsca91
-
MD5
b6a21ab39a7778dc807009a9cd23d82c
-
SHA1
817268a507ce95db80028c0b0b095a3b3ed1cbc3
-
SHA256
6723c608be16ce8a8e79c52dfae90c4fefa55b386411ac977d9565e4308c727d
-
SHA512
7587c25beb4853fe58cfd8c2cce0f0de0dd4e976824e580e4c2d71271f542ec6f9fbc0d7958e6da483dfe5e2a317e5dc6091c12319d2d94bfbfa973fbcd5a869
-
SSDEEP
24576:iiSvJKfOVWGK+PvpWuiWIpOEYWtR167N:kKfIG+PvpWI4ti7
Behavioral task
behavioral1
Sample
b6a21ab39a7778dc807009a9cd23d82c.exe
Resource
win7-20240221-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/864993390039138344/KcIraJ14D-c_gxt8b62QhfVu_PGaoIgxX5A9WLR2Iw9WLUoF8VGIsnRR969mXFvP0Unf
Targets
-
-
Target
b6a21ab39a7778dc807009a9cd23d82c
-
Size
943KB
-
MD5
b6a21ab39a7778dc807009a9cd23d82c
-
SHA1
817268a507ce95db80028c0b0b095a3b3ed1cbc3
-
SHA256
6723c608be16ce8a8e79c52dfae90c4fefa55b386411ac977d9565e4308c727d
-
SHA512
7587c25beb4853fe58cfd8c2cce0f0de0dd4e976824e580e4c2d71271f542ec6f9fbc0d7958e6da483dfe5e2a317e5dc6091c12319d2d94bfbfa973fbcd5a869
-
SSDEEP
24576:iiSvJKfOVWGK+PvpWuiWIpOEYWtR167N:kKfIG+PvpWI4ti7
-
Modifies WinLogon for persistence
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1