General
-
Target
e16ee052369026471a2217cb65ee506b
-
Size
6.0MB
-
Sample
240327-memgmaaa48
-
MD5
e16ee052369026471a2217cb65ee506b
-
SHA1
60105513f4f77d0ecad47e0aed4c66ab3e35251b
-
SHA256
9df1a60a4b1b87e74e49523d5f16f4a13526e9b993839aec7c887a063453fdfa
-
SHA512
48bfd72ec18fa02eeb1834f09692032d0cf28ce4f36d8a14e34b81c1d825a5a7ced42709293a690c97a88266fb0249d2901f2313e9f200f46ce66b57bdf0ac36
-
SSDEEP
98304:kT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnN6:018S6ZyKJz+ezUHQtBE
Static task
static1
Behavioral task
behavioral1
Sample
e16ee052369026471a2217cb65ee506b.exe
Resource
win7-20240221-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/871356915303710720/aJQeq8OY3wwqIiXWkN97pUlIjJQhxawbR5zbwOuO96jrzWKG4INekUUjRxLOjy9VbIsi
Targets
-
-
Target
e16ee052369026471a2217cb65ee506b
-
Size
6.0MB
-
MD5
e16ee052369026471a2217cb65ee506b
-
SHA1
60105513f4f77d0ecad47e0aed4c66ab3e35251b
-
SHA256
9df1a60a4b1b87e74e49523d5f16f4a13526e9b993839aec7c887a063453fdfa
-
SHA512
48bfd72ec18fa02eeb1834f09692032d0cf28ce4f36d8a14e34b81c1d825a5a7ced42709293a690c97a88266fb0249d2901f2313e9f200f46ce66b57bdf0ac36
-
SSDEEP
98304:kT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnN6:018S6ZyKJz+ezUHQtBE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-