General

  • Target

    c5dacab622f452f91ce005703e0bc6d68ee08817cdc162838a6a78b668ac5015.bin

  • Size

    670KB

  • Sample

    220301-wtvk8acfen

  • MD5

    6c91aa94509b1fbf1351b6b601376ced

  • SHA1

    1d201a32c86c47857fa28c4a72eb06430cfdf403

  • SHA256

    c5dacab622f452f91ce005703e0bc6d68ee08817cdc162838a6a78b668ac5015

  • SHA512

    71cade36d070cef2f881a8b0275174646ffb3fb853a4283053a3fddf8d9a386b9f392af0588fe99526c64f8db0cefc6dfde8ed3a0ec03f8bc8b4a1f2de36a964

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/935674326005452843/n313_PZZgcgpj4_wtUKbgWkESMf9Tw1q8RyfZ4vXaLdQI1Tu0RDtOvEGux26D8MiKPw4

Targets

    • Target

      c5dacab622f452f91ce005703e0bc6d68ee08817cdc162838a6a78b668ac5015.bin

    • Size

      670KB

    • MD5

      6c91aa94509b1fbf1351b6b601376ced

    • SHA1

      1d201a32c86c47857fa28c4a72eb06430cfdf403

    • SHA256

      c5dacab622f452f91ce005703e0bc6d68ee08817cdc162838a6a78b668ac5015

    • SHA512

      71cade36d070cef2f881a8b0275174646ffb3fb853a4283053a3fddf8d9a386b9f392af0588fe99526c64f8db0cefc6dfde8ed3a0ec03f8bc8b4a1f2de36a964

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks