Analysis
-
max time kernel
163s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 10:21
Behavioral task
behavioral1
Sample
cdce543cd450caefdbb4a26d8166f6ed.exe
Resource
win7-20240220-en
General
-
Target
cdce543cd450caefdbb4a26d8166f6ed.exe
-
Size
281KB
-
MD5
cdce543cd450caefdbb4a26d8166f6ed
-
SHA1
20e0e1d618d285ca41b11d94615a4cd05bc896a6
-
SHA256
ab483f365d90ef57576d730e5386d3bd47deda47abfc1dc9bf3d71bb0044cfbe
-
SHA512
724424c2b888d15834543541b76f7c12e2cdf370076ea8131b5d5f4a7cc41796599a54a55eac5477848fe0ea3d9acf34c9ef8d7091cfa15fa682c2b9c52c66c0
-
SSDEEP
3072:KdH00+bxduBTyhNJU8g50X0psXd0MTHQqU/EbLIX+Fogj46tYZIkSiJOGA3hI/Ks:+4xduBOhNJVvQBILIX+FogjPYZTZ
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/765103913988784149/W5RQaou5OFSODUHo_pEb6-NGCPMx-yToLvIwdKe04A93TB7yZH7I2VNL839P5qrdt9tE
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 freegeoip.app 17 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
cdce543cd450caefdbb4a26d8166f6ed.exepid process 3132 cdce543cd450caefdbb4a26d8166f6ed.exe 3132 cdce543cd450caefdbb4a26d8166f6ed.exe 3132 cdce543cd450caefdbb4a26d8166f6ed.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cdce543cd450caefdbb4a26d8166f6ed.exedescription pid process Token: SeDebugPrivilege 3132 cdce543cd450caefdbb4a26d8166f6ed.exe