General
-
Target
ba91e2cefca6e39537c09b39a52c0804
-
Size
3.1MB
-
Sample
240308-fk4jrsge8x
-
MD5
ba91e2cefca6e39537c09b39a52c0804
-
SHA1
d7d5321eb7715a0333f8dba7b9525e6545832626
-
SHA256
daba765d0976cef05ea981ca8d722a047138a24f31fe318e8a3d550251dd703f
-
SHA512
25d859aff4bf32090eb10caf608e5cb46af5238a2183700b132e977e231f9195ac084db0cdf7508a923b32be817c73847817deec512eb01182277ac9ffcc39c8
-
SSDEEP
49152:+cSg4AV+b5KxOKezg2J0UxzklXUVYrvW9KbI9NBeqIX226txvAL66+U73:+/GV+IWlyUxdoIKONwqIX22ExhQ3
Static task
static1
Behavioral task
behavioral1
Sample
ba91e2cefca6e39537c09b39a52c0804.exe
Resource
win7-20240221-en
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/859014405580783637/J-rOLcLQORAp4rSIpre0H46Lhmzd8QK1hgRFNA4mqYSEz6dtJRq9HsK-id725NgqZTvK
Targets
-
-
Target
ba91e2cefca6e39537c09b39a52c0804
-
Size
3.1MB
-
MD5
ba91e2cefca6e39537c09b39a52c0804
-
SHA1
d7d5321eb7715a0333f8dba7b9525e6545832626
-
SHA256
daba765d0976cef05ea981ca8d722a047138a24f31fe318e8a3d550251dd703f
-
SHA512
25d859aff4bf32090eb10caf608e5cb46af5238a2183700b132e977e231f9195ac084db0cdf7508a923b32be817c73847817deec512eb01182277ac9ffcc39c8
-
SSDEEP
49152:+cSg4AV+b5KxOKezg2J0UxzklXUVYrvW9KbI9NBeqIX226txvAL66+U73:+/GV+IWlyUxdoIKONwqIX22ExhQ3
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-