General

  • Target

    7d87165c3a5c1985f306f5d0ed1d9e81.bin

  • Size

    111KB

  • Sample

    230123-r9dv7adg49

  • MD5

    9e9db5a60af7bd6937bce0a92cd7ae45

  • SHA1

    76711f130cd7237ee0fbe9f864b35aeda1cb9f23

  • SHA256

    7d5c7fc5d0615f627cbeb5ea0a57bc6a55ceb68a108257a56e74da987d6b12e1

  • SHA512

    2ec01ec520385966384950e919774f8b321e412f3220e530e0997d29015ffa4bc6d400afaa6ffeee1b5f2dccb0546e56cedbedbdd76c9385d719a9f0ae64a7e6

  • SSDEEP

    3072:4l9yVyipPwdQpBaUb38ALWiFva6n7IaAKc:bxPRRIAKiFvaQPvc

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1065354220359913512/Pys3daas1BA3mMnC78xAMBPHAX9j0vr2z02qX-TBFsJ7NrEwvGO3zrMc5T_i0UCkjNUs

Targets

    • Target

      5202a078b8140dcdee1252affb3011ea07dc5545f3c47fc4ea65545e4701e7bd.exe

    • Size

      275KB

    • MD5

      7d87165c3a5c1985f306f5d0ed1d9e81

    • SHA1

      04b2dd39db67c0b6c2b876c93ddbba00fb98d448

    • SHA256

      5202a078b8140dcdee1252affb3011ea07dc5545f3c47fc4ea65545e4701e7bd

    • SHA512

      ad803c4454715fcbfd6ac894010f607af7894dce38d2800fa8c69c9a0b4fc61601a60a8564065298a74fc93a732314cdacd12b2668b5861bd9856e413b2fbfa8

    • SSDEEP

      6144:8f+BLtABPDdtkQKhzoPrH01kdPF41V6GIeyBiRA1D0FcE:CtkoPj01oY69eyBH1DFE

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks