General

  • Target

    3ac95607d654c3a0457075744e46c2277e7be98ddb21f1e4c29a98fa6c562876

  • Size

    303KB

  • Sample

    220822-zmxc1sfhb9

  • MD5

    74a7ff4c9395b44c406ca8e7ed5dee9b

  • SHA1

    9f2a294a86246658dfae747001e551575e8855d9

  • SHA256

    3ac95607d654c3a0457075744e46c2277e7be98ddb21f1e4c29a98fa6c562876

  • SHA512

    39417987022f08a292cacc47f230db45089c9f92222de407022ae92900ffa13068b3c391881297131f8625347ae088ea0c48279b5d89bbc4d5b6e2a33ad1bf64

  • SSDEEP

    6144:5v1T6MDdbICydeBxbf0G3aLpbwsW6nmA1D0/Bg:5vD10G3alsdk1Dug

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/991370448359149568/RQxL-Wum2YoYSXPZfI3xuNcwtnpuYnQk8G0BlkCMwdJqrQOP34mG0-uNULXiYZDZOObD

Targets

    • Target

      3ac95607d654c3a0457075744e46c2277e7be98ddb21f1e4c29a98fa6c562876

    • Size

      303KB

    • MD5

      74a7ff4c9395b44c406ca8e7ed5dee9b

    • SHA1

      9f2a294a86246658dfae747001e551575e8855d9

    • SHA256

      3ac95607d654c3a0457075744e46c2277e7be98ddb21f1e4c29a98fa6c562876

    • SHA512

      39417987022f08a292cacc47f230db45089c9f92222de407022ae92900ffa13068b3c391881297131f8625347ae088ea0c48279b5d89bbc4d5b6e2a33ad1bf64

    • SSDEEP

      6144:5v1T6MDdbICydeBxbf0G3aLpbwsW6nmA1D0/Bg:5vD10G3alsdk1Dug

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks