General

  • Target

    c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.bin

  • Size

    793KB

  • Sample

    220301-wtyb4scfep

  • MD5

    f559e77721d8cc5bd97e037c4b3472cc

  • SHA1

    f6dda6d685285301e23fd51338d0977fb5e03a6e

  • SHA256

    c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d

  • SHA512

    64d6e8d0bc9862f9eab80d0fa95fdbb42eab44efed4a90abe1a6a0c8b1a308b5940d90740beb211dd6c375b8dd1fb1706a76f484ccf439cfc3bb2ae0aacb3dd9

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/939927794656370699/MQUodH1jMxGoELXDI7vt3uVKvZAZN_FBkYRFlTiMVxHGCFnEzvPC7JNVH8-ESePeneQo

Targets

    • Target

      c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d.bin

    • Size

      793KB

    • MD5

      f559e77721d8cc5bd97e037c4b3472cc

    • SHA1

      f6dda6d685285301e23fd51338d0977fb5e03a6e

    • SHA256

      c6181c98720e7976fdf7356503ae8ec501136ca26028796fee8e666813bd5e5d

    • SHA512

      64d6e8d0bc9862f9eab80d0fa95fdbb42eab44efed4a90abe1a6a0c8b1a308b5940d90740beb211dd6c375b8dd1fb1706a76f484ccf439cfc3bb2ae0aacb3dd9

    • 44Caliber

      An open source infostealer written in C#.

    • Executes dropped EXE

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks