Resubmissions

14-03-2022 20:45

220314-zj49fsccc8 10

02-03-2022 21:06

220302-zxssksgcd2 7

General

  • Target

    inside3.exe

  • Size

    282KB

  • Sample

    220314-zj49fsccc8

  • MD5

    0238e5a4b41c4dcff77e8b01e88bed22

  • SHA1

    9c265d639104a538f708d5aaef6fcb9b61a8048f

  • SHA256

    a63d0da5401d3f5d28a9e8ac8c6a6fe7ba7eb7b1e1e60d1ec47a3eb7dd079808

  • SHA512

    4add1b607fdfd4159745a7ed1fb02543ce210b9e36996ea404c05fc491bce2471c452cbf0aad3de0b1f1f563ca23f843ef77d9d85ffc6828b6924c4fa34b4bac

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/943188844625428520/64LwO5Gsh0pUZCcm80BNwTcVPihRnEmr1rZOPj02k6T5sRc5Lq4sdaB2KyttNgJHeX3T

Targets

    • Target

      inside3.exe

    • Size

      282KB

    • MD5

      0238e5a4b41c4dcff77e8b01e88bed22

    • SHA1

      9c265d639104a538f708d5aaef6fcb9b61a8048f

    • SHA256

      a63d0da5401d3f5d28a9e8ac8c6a6fe7ba7eb7b1e1e60d1ec47a3eb7dd079808

    • SHA512

      4add1b607fdfd4159745a7ed1fb02543ce210b9e36996ea404c05fc491bce2471c452cbf0aad3de0b1f1f563ca23f843ef77d9d85ffc6828b6924c4fa34b4bac

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks