General

  • Target

    902683505c95e889efddf689d20757d7dbe7958330f089660f042ff15d63548e.bin

  • Size

    303KB

  • Sample

    220301-wtbhcabag9

  • MD5

    ed2ba312101c8e6860e12b439190efd2

  • SHA1

    c0eeefeea67ea0930e690e3d764cf58762abe7bf

  • SHA256

    902683505c95e889efddf689d20757d7dbe7958330f089660f042ff15d63548e

  • SHA512

    0138a0b34ad44f0e3da7c0a1950e35e7d98e6b21f9c517a246d57382e1fe76268c84e62061f329daf159e947afdc6cef6e9db8d4d01670c69e768219cee29639

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/940603138866548747/iK_mJn3uZkhsOGcPCb1oD8P_Ng4y0gU75tAl36SdkiDuyN71SOCzAe43fyWh488hj7EO

Targets

    • Target

      902683505c95e889efddf689d20757d7dbe7958330f089660f042ff15d63548e.bin

    • Size

      303KB

    • MD5

      ed2ba312101c8e6860e12b439190efd2

    • SHA1

      c0eeefeea67ea0930e690e3d764cf58762abe7bf

    • SHA256

      902683505c95e889efddf689d20757d7dbe7958330f089660f042ff15d63548e

    • SHA512

      0138a0b34ad44f0e3da7c0a1950e35e7d98e6b21f9c517a246d57382e1fe76268c84e62061f329daf159e947afdc6cef6e9db8d4d01670c69e768219cee29639

    • 44Caliber

      An open source infostealer written in C#.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks