General
-
Target
WoksiMeneg.exe
-
Size
303KB
-
Sample
240909-vg8rmszakl
-
MD5
ee725ca0f25f388656a01de2d5f222b8
-
SHA1
d67fd88ffc308db1b7f2d60ce9299191cdfdcf48
-
SHA256
638d64d65efd9ad2661bb6f33677689fc17a8b370751e7bb8ae255bc0ebba282
-
SHA512
18f3de4ffdebd550bbb40547138da3f2ad905a35bb6af3d4e862de157cd9e090218cd4b1407c69a451e8ad18afa248220e8e5aa70623cd53ff01e9148f55c504
-
SSDEEP
6144:w1E0T6MDdbICydeB1MnyCvG/9GzC6LmA1D0XoO:w1z6yCvGFG+w1DPO
Behavioral task
behavioral1
Sample
WoksiMeneg.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
WoksiMeneg.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1282656223682105405/fZzk0Hd_vZyiyOmXb8Q0ODSwm2YlkGtfF7H4LgbvREcWNQZksDAPfCAcrAdCpAx0oVA1
Targets
-
-
Target
WoksiMeneg.exe
-
Size
303KB
-
MD5
ee725ca0f25f388656a01de2d5f222b8
-
SHA1
d67fd88ffc308db1b7f2d60ce9299191cdfdcf48
-
SHA256
638d64d65efd9ad2661bb6f33677689fc17a8b370751e7bb8ae255bc0ebba282
-
SHA512
18f3de4ffdebd550bbb40547138da3f2ad905a35bb6af3d4e862de157cd9e090218cd4b1407c69a451e8ad18afa248220e8e5aa70623cd53ff01e9148f55c504
-
SSDEEP
6144:w1E0T6MDdbICydeB1MnyCvG/9GzC6LmA1D0XoO:w1z6yCvGFG+w1DPO
Score10/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-