Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 04:06
Behavioral task
behavioral1
Sample
6602a6768c612807b54ad5e282106d80N.exe
Resource
win7-20240705-en
General
-
Target
6602a6768c612807b54ad5e282106d80N.exe
-
Size
303KB
-
MD5
6602a6768c612807b54ad5e282106d80
-
SHA1
554c249b0b54838ab326ced44234018e3d26f6a5
-
SHA256
fd0c25564e7fe0dbc2aa456defdbb4c8e4d3e6768adbc72462e9a3b48e63cb47
-
SHA512
f161c5a194abfbf43c9930b7f3e99b6b41edb4abc0520ee292fc6189ba95a9b87525526eb454e18537147e4bae51828a530155392628a8755c9a6d91691937d4
-
SSDEEP
6144:20tC6MDdbICydeB25aBRH5QreWQAKAKtBvUEWA1D0xYqnT:20q/BRH5QyYKZ1DwHnT
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1261337809793581077/th-zisFe-ONOBv0rIRsugBNZzyStJ-lRYkNoNm0Wd0XiY_0pKxTkCodWZeXwnZ-c_zi5
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 freegeoip.app 2 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
6602a6768c612807b54ad5e282106d80N.exepid Process 2788 6602a6768c612807b54ad5e282106d80N.exe 2788 6602a6768c612807b54ad5e282106d80N.exe 2788 6602a6768c612807b54ad5e282106d80N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6602a6768c612807b54ad5e282106d80N.exedescription pid Process Token: SeDebugPrivilege 2788 6602a6768c612807b54ad5e282106d80N.exe