General
-
Target
a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6
-
Size
274KB
-
Sample
240324-3ccseada5x
-
MD5
0f62fa73ab2574ad652247b0d0c1d53b
-
SHA1
9755b759767a62ee6f0d188fc0713b7d9f4da6c2
-
SHA256
a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6
-
SHA512
ba726cac73b9c5a491ba74cb61731d90da54ee9d709d6f08ea9bde41f5bd4cb6013de4e1e068df7ea29b12a9bb6d2dbb0cef2585057722f4260faf0cfe34d698
-
SSDEEP
6144:cf+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGR1afTyElI1D0uwX:n161eO5rbHHsYqTXG9p1D2X
Behavioral task
behavioral1
Sample
a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6.exe
Resource
win7-20231129-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1220750955448893500/rzVzB_J0mIM7yMj5hlY1HnUJ8dpAQ8Q15SDx6jq9JhiYRJikDTjetvA86KDH-S-q1sWM
Targets
-
-
Target
a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6
-
Size
274KB
-
MD5
0f62fa73ab2574ad652247b0d0c1d53b
-
SHA1
9755b759767a62ee6f0d188fc0713b7d9f4da6c2
-
SHA256
a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6
-
SHA512
ba726cac73b9c5a491ba74cb61731d90da54ee9d709d6f08ea9bde41f5bd4cb6013de4e1e068df7ea29b12a9bb6d2dbb0cef2585057722f4260faf0cfe34d698
-
SSDEEP
6144:cf+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGR1afTyElI1D0uwX:n161eO5rbHHsYqTXG9p1D2X
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables Discord URL observed in first stage droppers
-
Detects executables referencing Discord tokens regular expressions
-
Detects executables referencing credit card regular expressions
-
Detects executables referencing many VPN software clients. Observed in infosteslers
-
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-