General

  • Target

    Cheat installer.exe

  • Size

    274KB

  • Sample

    220304-v6lneafdh9

  • MD5

    6649fec7c656c6ab0ae0a27daf3ebb8e

  • SHA1

    e0dc4ad2ce0fc457f5979f41b0c4186756a7f40a

  • SHA256

    943fbead0c78c80da198e3cb1dafadf34b0584c17dd9304d91f05f574c12c246

  • SHA512

    ae13a1cd1e3a14798a8affa34a23f148706e8c12952a43d4b17dd2d9da0dbee6c5d29d1d77b6ef8d6b843ab852048f134431082a5342465da289f387644fcc0a

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/947181971019292714/gXE5T4ZQQF0yGOhuBSDhTkFXB0ut9ai71IZmOFvsdIaznalhyvQP0h45xCss-8W7KQCo

Targets

    • Target

      Cheat installer.exe

    • Size

      274KB

    • MD5

      6649fec7c656c6ab0ae0a27daf3ebb8e

    • SHA1

      e0dc4ad2ce0fc457f5979f41b0c4186756a7f40a

    • SHA256

      943fbead0c78c80da198e3cb1dafadf34b0584c17dd9304d91f05f574c12c246

    • SHA512

      ae13a1cd1e3a14798a8affa34a23f148706e8c12952a43d4b17dd2d9da0dbee6c5d29d1d77b6ef8d6b843ab852048f134431082a5342465da289f387644fcc0a

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks