General
-
Target
rowz.rar
-
Size
111KB
-
Sample
240804-wcn24svhle
-
MD5
0e0d40f4942e7ad55b1a39eac692cb74
-
SHA1
0665a43ff98e9246c3379afa8efdd7002f222bda
-
SHA256
433862c5f17d81ca847c161e0ab28cb38dcea2523150fed0ac6ee60c47031325
-
SHA512
cea5b31624a28214df7431cb26033e47a2a06b706e5748bfaf70fc121c8eeb1e1f99feb75f14a2b37092dc604e3a8faf7b57dd1d89262e0e32a533ca18036613
-
SSDEEP
1536:X9Z7W6Z86mLNJIqyXuBpvy9QIjb6MWB2SsjNsovZcYkMzJb9T4y3MAjqDRNWXBfP:DW6y6m7IqgscQ54vcYkqpr81DnXg76a7
Behavioral task
behavioral1
Sample
execute.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
execute.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1264290240290361368/HDo7Noqy1EZnwf2Slhpj8GKIwaCmP_A66Af1DGldm_aCLel95CQQWcTbmmU_vwpsIMZr
Targets
-
-
Target
execute.exe
-
Size
303KB
-
MD5
7cfe3e4a9b6da9b158ebf7e0d1ab9945
-
SHA1
a238ffedd893f57dcfcd70fff18c37aef9fd416e
-
SHA256
cdcad2a6891cfaa9635c0718f3344280f8d02a78611bd6ca234e8bf22603613c
-
SHA512
006ef6f83b13afddf814226f00ddba4580f74939c9a051b9537bbe352cb213e4c366548927363f573d04bad69520c3b843b466fb86f700d2e9ef9caf2d33dd4b
-
SSDEEP
6144:9v9T6MDdbICydeBhbvsGfSDpbwko6jmA1D0Zi6:9vLFsGfSNsjY1DT6
Score10/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-