General

  • Target

    cheat-engine-7-404.exe

  • Size

    3.0MB

  • Sample

    220519-ttn3bshed4

  • MD5

    cdc4636a35c109b43f2898e13e8dc666

  • SHA1

    1c0807042275593c79da97799153b72929dfb2d8

  • SHA256

    347899570bba1cbaa4fe9149d71b7e2e07ea2d930d1bcb9e5762b242dd017887

  • SHA512

    9498fd4c2fc65ae0b1294f4d37f6a0df50d92ffd9709f79ffd9606add19962c7493f68dc7f279e398fecf68d2b57f0f87db5f4d2e7df3f31364cce26dbd0e4ef

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/973294177112686612/4QUQSbqvdZZd-DqEn3jQ1gWfu67yolKc4k1__wufBB-BWQv0dBmUKe8-IpUD-6DotJiV

Targets

    • Target

      cheat-engine-7-404.exe

    • Size

      3.0MB

    • MD5

      cdc4636a35c109b43f2898e13e8dc666

    • SHA1

      1c0807042275593c79da97799153b72929dfb2d8

    • SHA256

      347899570bba1cbaa4fe9149d71b7e2e07ea2d930d1bcb9e5762b242dd017887

    • SHA512

      9498fd4c2fc65ae0b1294f4d37f6a0df50d92ffd9709f79ffd9606add19962c7493f68dc7f279e398fecf68d2b57f0f87db5f4d2e7df3f31364cce26dbd0e4ef

    • 44Caliber

      An open source infostealer written in C#.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks