General

  • Target

    f0340ac2a3eb737c9842542de85cd7f0eda9469f55c6f8c6419055f1a82a8af2.bin

  • Size

    274KB

  • Sample

    220301-wva8zacffm

  • MD5

    84a1932e30c859e08077728d34f7dd74

  • SHA1

    5de9345885356fb54f47957310619bfcd36c0c6f

  • SHA256

    f0340ac2a3eb737c9842542de85cd7f0eda9469f55c6f8c6419055f1a82a8af2

  • SHA512

    2bfe5598509cebae5636fac2eca3000e9390b5152621562584077433709d98bc67dfa4cdf9cdebff3d5cd0a29351a445078113603885483d7d58aac38ba7e496

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/943953361051480117/bY4XtF54sBnlCQtX2e-fW-LWeLydoy2U3T2UdT-0mQglWZI4GyB_rry_NrQI2fJJsyVP

Targets

    • Target

      f0340ac2a3eb737c9842542de85cd7f0eda9469f55c6f8c6419055f1a82a8af2.bin

    • Size

      274KB

    • MD5

      84a1932e30c859e08077728d34f7dd74

    • SHA1

      5de9345885356fb54f47957310619bfcd36c0c6f

    • SHA256

      f0340ac2a3eb737c9842542de85cd7f0eda9469f55c6f8c6419055f1a82a8af2

    • SHA512

      2bfe5598509cebae5636fac2eca3000e9390b5152621562584077433709d98bc67dfa4cdf9cdebff3d5cd0a29351a445078113603885483d7d58aac38ba7e496

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks