General
-
Target
6602a6768c612807b54ad5e282106d80N.exe
-
Size
303KB
-
Sample
240716-ephmestgrq
-
MD5
6602a6768c612807b54ad5e282106d80
-
SHA1
554c249b0b54838ab326ced44234018e3d26f6a5
-
SHA256
fd0c25564e7fe0dbc2aa456defdbb4c8e4d3e6768adbc72462e9a3b48e63cb47
-
SHA512
f161c5a194abfbf43c9930b7f3e99b6b41edb4abc0520ee292fc6189ba95a9b87525526eb454e18537147e4bae51828a530155392628a8755c9a6d91691937d4
-
SSDEEP
6144:20tC6MDdbICydeB25aBRH5QreWQAKAKtBvUEWA1D0xYqnT:20q/BRH5QyYKZ1DwHnT
Behavioral task
behavioral1
Sample
6602a6768c612807b54ad5e282106d80N.exe
Resource
win7-20240705-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1261337809793581077/th-zisFe-ONOBv0rIRsugBNZzyStJ-lRYkNoNm0Wd0XiY_0pKxTkCodWZeXwnZ-c_zi5
Targets
-
-
Target
6602a6768c612807b54ad5e282106d80N.exe
-
Size
303KB
-
MD5
6602a6768c612807b54ad5e282106d80
-
SHA1
554c249b0b54838ab326ced44234018e3d26f6a5
-
SHA256
fd0c25564e7fe0dbc2aa456defdbb4c8e4d3e6768adbc72462e9a3b48e63cb47
-
SHA512
f161c5a194abfbf43c9930b7f3e99b6b41edb4abc0520ee292fc6189ba95a9b87525526eb454e18537147e4bae51828a530155392628a8755c9a6d91691937d4
-
SSDEEP
6144:20tC6MDdbICydeB25aBRH5QreWQAKAKtBvUEWA1D0xYqnT:20q/BRH5QyYKZ1DwHnT
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-