General
-
Target
d008b5ac1b929144d485b6042baebe2b
-
Size
14.7MB
-
Sample
240317-f2z8nsfa97
-
MD5
d008b5ac1b929144d485b6042baebe2b
-
SHA1
d3f1da5864d24d0f1c86e24ab56322df55206100
-
SHA256
81e5007b1563752afaded075c7d864a85da680f1a07f4f38cdb0326a31658401
-
SHA512
6e1c2d1edd951856b4fedd2b8e2226124e80c4fee101597ec82f71197e24c1cef86034add6336d0f3d3a0cd95edeb4409a33e832a8dec3f29e790678328b5146
-
SSDEEP
393216:Xa664wtF3JuBnaO6Fje2fXVI/Hy3AYtDDD:v6j3U541e8VqS3AKDD
Static task
static1
Behavioral task
behavioral1
Sample
d008b5ac1b929144d485b6042baebe2b.exe
Resource
win7-20240221-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/869968115126128690/9HuocC8P0OFpxwEHR7UGW0ZtseqV8b95oQ9ExN0rHkwTjipAQLrkOqPzDiDXxXky3kUL
Targets
-
-
Target
d008b5ac1b929144d485b6042baebe2b
-
Size
14.7MB
-
MD5
d008b5ac1b929144d485b6042baebe2b
-
SHA1
d3f1da5864d24d0f1c86e24ab56322df55206100
-
SHA256
81e5007b1563752afaded075c7d864a85da680f1a07f4f38cdb0326a31658401
-
SHA512
6e1c2d1edd951856b4fedd2b8e2226124e80c4fee101597ec82f71197e24c1cef86034add6336d0f3d3a0cd95edeb4409a33e832a8dec3f29e790678328b5146
-
SSDEEP
393216:Xa664wtF3JuBnaO6Fje2fXVI/Hy3AYtDDD:v6j3U541e8VqS3AKDD
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-