General

  • Target

    05665999.exe

  • Size

    718KB

  • Sample

    230607-pb4ylsaf5x

  • MD5

    e5701891f96e5727971f223551b64f45

  • SHA1

    dcc476ee7b6c9bb75195c1ab81512d5c6efacd40

  • SHA256

    1a7c622544bc7fce75780a488bbf9d66a68176405c40d196a7afb7124244bd41

  • SHA512

    2c8a44b882bce13e226ab0a7941c57a8b383c793626cf15a16e81abbcaa033b78a536cbeb03e2bdbd4c923102bb6d967f90e4cc38570fb2f5ebd32706da9e998

  • SSDEEP

    12288:jccr2M0k0CTUxid6rfBCWxskGxo5PlAXY5sMIGH/c4j:IcpBjN6rfBCWmx42I5HIGfcY

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1049356312187772968/RhGBI5VRUa2070gE61YTrZzr1G_QOPG0A5RvRIUDuTemlVPlposGOfVeFkkYgdFFQO5I

Targets

    • Target

      05665999.exe

    • Size

      718KB

    • MD5

      e5701891f96e5727971f223551b64f45

    • SHA1

      dcc476ee7b6c9bb75195c1ab81512d5c6efacd40

    • SHA256

      1a7c622544bc7fce75780a488bbf9d66a68176405c40d196a7afb7124244bd41

    • SHA512

      2c8a44b882bce13e226ab0a7941c57a8b383c793626cf15a16e81abbcaa033b78a536cbeb03e2bdbd4c923102bb6d967f90e4cc38570fb2f5ebd32706da9e998

    • SSDEEP

      12288:jccr2M0k0CTUxid6rfBCWxskGxo5PlAXY5sMIGH/c4j:IcpBjN6rfBCWmx42I5HIGfcY

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks