General
-
Target
TOTAL.zip
-
Size
1.2MB
-
Sample
240720-rhp45szerc
-
MD5
5fd4329f29c730ff72f4055d799662b2
-
SHA1
090cd87c84bd78d6a9d36d5ae4c5bd7510b757ea
-
SHA256
1862de02fa8eff612a8d616c5d405bc5898c35fd3cfc74c6b8ceeda8b5bb8db3
-
SHA512
9df46d763fbaa1594341d72fbd79d088f5f5658c5d428df07974190ce3b123476786bc78425739603e2f11aab8164e7492ec8b94554d7793526a224d730cbe16
-
SSDEEP
12288:7zi5IGv20sKM1DbOQ+OAsy7D9vLYGCK3L50o9vC0P:yl2gBQYznlLYS3PlX
Behavioral task
behavioral1
Sample
TOTAL.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
TOTAL.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
CR9CK/CR9CK.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
CR9CK/CR9CK.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
CR9CK/CR9CK.pdb
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CR9CK/CR9CK.pdb
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
CR9CK/progress.exe.xml
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
CR9CK/progress.exe.xml
Resource
win10v2004-20240709-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1259949517135151126/locx-MKcF15uY85qiDh_Kt5nRCte0luK62KFHfEH79iF3r9uRpGPhsG-g9YijITFCe5d
Targets
-
-
Target
TOTAL.zip
-
Size
1.2MB
-
MD5
5fd4329f29c730ff72f4055d799662b2
-
SHA1
090cd87c84bd78d6a9d36d5ae4c5bd7510b757ea
-
SHA256
1862de02fa8eff612a8d616c5d405bc5898c35fd3cfc74c6b8ceeda8b5bb8db3
-
SHA512
9df46d763fbaa1594341d72fbd79d088f5f5658c5d428df07974190ce3b123476786bc78425739603e2f11aab8164e7492ec8b94554d7793526a224d730cbe16
-
SSDEEP
12288:7zi5IGv20sKM1DbOQ+OAsy7D9vLYGCK3L50o9vC0P:yl2gBQYznlLYS3PlX
Score1/10 -
-
-
Target
CR9CK/CR9CK.exe
-
Size
303KB
-
MD5
d58c2577966ca8563fd69729151f52ea
-
SHA1
efed2d279e6b2a23a46392731cc8d36411bcdcb3
-
SHA256
4164f7408da2a5a31318d8a6da3c17546f6782822a07e928c0824401cce69830
-
SHA512
8502777f3ddca95dcda8f1962945f6285ee0fe2a2bf008d35066bf0b6eb97733822d7ade6c6b5134c64036d2a2d80802641529283cd30d757bc0b552a5fc9b1c
-
SSDEEP
6144:Uz2ZNT6MDdbICydeBblLIGv2A5siP6vmA1D0g/O:Uzi5IGv20sKM1DbO
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
CR9CK/CR9CK.pdb
-
Size
955KB
-
MD5
1d4b71a9d5b1d0c2354567f6a24abe14
-
SHA1
3e8dc08d03b65473d088fb31b770c00fb504d506
-
SHA256
a843fcdc6a84e7aca0c679b2a4d4d1e39a3c69cd94cfae4e3ebe7d10564bfca8
-
SHA512
74e9dcee57650a5dd109235a39d208e03bc6ef8795e53d4b7fac9605c897f22570f5067d2a0bf4280dc3a07a4b848653e24369fea855907da9ccab6b84f537fa
-
SSDEEP
6144:jtul3tZQCwOXckPOAR2CsfGcVknfqyZsAj51jDz6svLYtgpCIAVq3L5V6rsT2Fhv:H+OAsy7D9vLYGCK3L50o9vC0
Score3/10 -
-
-
Target
CR9CK/progress.exe.config
-
Size
161B
-
MD5
c16b0746faa39818049fe38709a82c62
-
SHA1
3fa322fe6ed724b1bc4fd52795428a36b7b8c131
-
SHA256
d61bde901e7189cc97d45a1d4c4aa39d4c4de2b68419773ec774338506d659ad
-
SHA512
cbcba899a067f8dc32cfcbd1779a6982d25955de91e1e02cee8eaf684a01b0dee3642c2a954903720ff6086de5a082147209868c03665c89f814c6219be2df7c
Score1/10 -