General

  • Target

    b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.bin

  • Size

    274KB

  • Sample

    220301-wtn4facfej

  • MD5

    1774b03fe04c0912378903346f6d807a

  • SHA1

    33fbaeeb05bfe3e985af80a4f400dbc236fa51bd

  • SHA256

    b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b

  • SHA512

    8a76d27bc58ccc481bbdaa726483bf84b8a5c3e6512b6259a26b64fffea697900edc1efe5405c9b6a6ac61fbcc8bc0653b506692dde7f1c1251692595bd4aec0

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/943405830781427732/bWrTiH0DBogSkJQzwQGoq_flifTRESk2r9Ezawioxg9zPGU0YKxSBP93A3sfQaAMshgX

Targets

    • Target

      b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b.bin

    • Size

      274KB

    • MD5

      1774b03fe04c0912378903346f6d807a

    • SHA1

      33fbaeeb05bfe3e985af80a4f400dbc236fa51bd

    • SHA256

      b05617170e474f6689b3c8bbf653e48b3b335d9924140f891a44327fe10cec8b

    • SHA512

      8a76d27bc58ccc481bbdaa726483bf84b8a5c3e6512b6259a26b64fffea697900edc1efe5405c9b6a6ac61fbcc8bc0653b506692dde7f1c1251692595bd4aec0

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks