General
-
Target
1e72a9db792b1faa8009ccd252d261de
-
Size
2.1MB
-
Sample
250402-cftbfssky9
-
MD5
1e72a9db792b1faa8009ccd252d261de
-
SHA1
cd449a868e9e2d5801d385e2c49aa19a67a6fd00
-
SHA256
dd60d316ef472c3ef62493b316b46255f42730ef2d8f124533e3917027780312
-
SHA512
400d3f24a941f7848ac80a53d31e29edd5c244779c0571d3a055de8e336dbd46e15a61ffd775487bcca0e03a5407b457e145da2617cd596ebca2401802d5fca1
-
SSDEEP
24576:xALaiyQh8LwQGTv5fTU5eY3w8hih7ymAyVlpxbiL/90a0OxaHlnJO8gDh5am:xAyI8DGj5Y8n8PkbNXnJqN
Static task
static1
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1328443348104515634/LQkwHvZ5wgKz-NuXgc2vsxbqUucIFN9w5eOlOXBKfXJDOLaOJg5AXeztsablYQxwk5D3
Targets
-
-
Target
1e72a9db792b1faa8009ccd252d261de
-
Size
2.1MB
-
MD5
1e72a9db792b1faa8009ccd252d261de
-
SHA1
cd449a868e9e2d5801d385e2c49aa19a67a6fd00
-
SHA256
dd60d316ef472c3ef62493b316b46255f42730ef2d8f124533e3917027780312
-
SHA512
400d3f24a941f7848ac80a53d31e29edd5c244779c0571d3a055de8e336dbd46e15a61ffd775487bcca0e03a5407b457e145da2617cd596ebca2401802d5fca1
-
SSDEEP
24576:xALaiyQh8LwQGTv5fTU5eY3w8hih7ymAyVlpxbiL/90a0OxaHlnJO8gDh5am:xAyI8DGj5Y8n8PkbNXnJqN
-
44Caliber family
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-