General
-
Target
082d09d95fdc1a362078d9374662588dbdc8f8e561199e3c8040059f739f77e7.exe
-
Size
274KB
-
Sample
250202-brk9jsypd1
-
MD5
cc38ca65b4b44a200e6df763acf832ce
-
SHA1
2243c93668f421ac5b9bcf2409afd494833000f7
-
SHA256
082d09d95fdc1a362078d9374662588dbdc8f8e561199e3c8040059f739f77e7
-
SHA512
a73a4e77565e44e7dc8cca24adf4817da0ca61f8177f6b209e95a32c7868833b7514d10d1acd5a1a0d77288b6634578c77b6627060b96963817fafb387937589
-
SSDEEP
6144:Cf+BLtABPD345GxbeCpwaUsZ3FVafTrNlI1D0Z2cP:y4sZKaUsZ3sg1DfcP
Behavioral task
behavioral1
Sample
082d09d95fdc1a362078d9374662588dbdc8f8e561199e3c8040059f739f77e7.exe
Resource
win7-20241010-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1268575223754522654/p3kG7TYiNnRJt6AGaKl6yqWSNq4m8D-z5DmsFHvopaDzLbxf2LlN6fYTIX4FWMVt7UOg
Targets
-
-
Target
082d09d95fdc1a362078d9374662588dbdc8f8e561199e3c8040059f739f77e7.exe
-
Size
274KB
-
MD5
cc38ca65b4b44a200e6df763acf832ce
-
SHA1
2243c93668f421ac5b9bcf2409afd494833000f7
-
SHA256
082d09d95fdc1a362078d9374662588dbdc8f8e561199e3c8040059f739f77e7
-
SHA512
a73a4e77565e44e7dc8cca24adf4817da0ca61f8177f6b209e95a32c7868833b7514d10d1acd5a1a0d77288b6634578c77b6627060b96963817fafb387937589
-
SSDEEP
6144:Cf+BLtABPD345GxbeCpwaUsZ3FVafTrNlI1D0Z2cP:y4sZKaUsZ3sg1DfcP
-
44Caliber family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-