General
-
Target
Loader.exe
-
Size
274KB
-
Sample
240626-mm5cea1akc
-
MD5
aa53f781ad5a200f415893c0da7396aa
-
SHA1
bba01d4263629a7830081ea7f2b5fd1bf7e324e5
-
SHA256
55b6defb5567076e025333cf20026653b1aaec699a5403b0f8f8cd167df3d5f9
-
SHA512
935a56faf5549d9467caba32ba797d3000f4edb5eade40f298de61a223dd2b542e7f3cad5c9916223c90632ac8628f9cc3046b02b3b9944b703067b7e05cee56
-
SSDEEP
6144:cf+BLtABPDMZZzIlzcwKUfmuO/9iXrEtdyIOe0dfx:7ZOnKUfmuO2oOeox
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1255468679362252871/AGwJ4HWq8HAstPJqHecN5XV6T9315TewkpWEdTuW8h93j721tZYBI8dhwOpsQP2k0PuH
Targets
-
-
Target
Loader.exe
-
Size
274KB
-
MD5
aa53f781ad5a200f415893c0da7396aa
-
SHA1
bba01d4263629a7830081ea7f2b5fd1bf7e324e5
-
SHA256
55b6defb5567076e025333cf20026653b1aaec699a5403b0f8f8cd167df3d5f9
-
SHA512
935a56faf5549d9467caba32ba797d3000f4edb5eade40f298de61a223dd2b542e7f3cad5c9916223c90632ac8628f9cc3046b02b3b9944b703067b7e05cee56
-
SSDEEP
6144:cf+BLtABPDMZZzIlzcwKUfmuO/9iXrEtdyIOe0dfx:7ZOnKUfmuO2oOeox
Score10/10-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-