General

  • Target

    file.exe

  • Size

    274KB

  • Sample

    221230-tztvrsfh93

  • MD5

    3f04b4e08e66469759384f9d905b949c

  • SHA1

    99d8f0433261512c8f99ef66d381a8cd1162decc

  • SHA256

    e23f8dbfb3869cad9ccd6cd26025fb3bdbb640b77e0b42a3208edb8d7b51eebb

  • SHA512

    8fe83f0dab5cb1791bb28fad4f953aece840b3aa94a4610a86b45ce3fa49c5c50facdf2e53f0f3dd11bab236dec260ac97e6c5ea84cf8e6d88b157708dea8d05

  • SSDEEP

    6144:sf+BLtABPD21otNj1RScMHIyFkZSlYeJqlA1D0C1T:h1AocYIyFFlYet1DzT

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1055782748293447701/GQatxB5N0FxpOZwgP_2nGRKKdqi401C_v9kdfX9NhXRb_6nQqw37JFX7YUrD_jgFWsU_

Targets

    • Target

      file.exe

    • Size

      274KB

    • MD5

      3f04b4e08e66469759384f9d905b949c

    • SHA1

      99d8f0433261512c8f99ef66d381a8cd1162decc

    • SHA256

      e23f8dbfb3869cad9ccd6cd26025fb3bdbb640b77e0b42a3208edb8d7b51eebb

    • SHA512

      8fe83f0dab5cb1791bb28fad4f953aece840b3aa94a4610a86b45ce3fa49c5c50facdf2e53f0f3dd11bab236dec260ac97e6c5ea84cf8e6d88b157708dea8d05

    • SSDEEP

      6144:sf+BLtABPD21otNj1RScMHIyFkZSlYeJqlA1D0C1T:h1AocYIyFFlYet1DzT

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks