General

  • Target

    b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac.bin

  • Size

    441KB

  • Sample

    220301-wtql9scfek

  • MD5

    292539bb44b33a26b14d7765695159d3

  • SHA1

    6a17fdbf8ef8351ffe2ff67b4159ca69ddd48f28

  • SHA256

    b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac

  • SHA512

    a86a7c3183235a8a5371cc51f1b82373e9e8060df9beccedadf3fb8efab96d9b486ae50b6a601ce07c727a2035f043a574d736f2811c2485441bb3083dfbb516

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/941047365631086602/V3bLg4Oq1PpqS0I4y0Iau7A7FmfvU9HodJZUfZspA0qYOBb5-PV3byaM7skOT24w1CCR

Targets

    • Target

      b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac.bin

    • Size

      441KB

    • MD5

      292539bb44b33a26b14d7765695159d3

    • SHA1

      6a17fdbf8ef8351ffe2ff67b4159ca69ddd48f28

    • SHA256

      b9f34d06a915b9a5d091acf7901dcf484e3894e73b72f621d2c484566dd818ac

    • SHA512

      a86a7c3183235a8a5371cc51f1b82373e9e8060df9beccedadf3fb8efab96d9b486ae50b6a601ce07c727a2035f043a574d736f2811c2485441bb3083dfbb516

    • 44Caliber

      An open source infostealer written in C#.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks