Resubmissions

31-07-2023 21:19

230731-z6ktbscc5y 10

31-07-2023 21:15

230731-z38e8abc24 10

31-07-2023 20:42

230731-zgyznaca71 10

General

  • Target

    https://anonfiles.com/veD8905azb/CleanerPRO_exe

  • Sample

    230731-zgyznaca71

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://pastebin.com/raw/zaCgrR02

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1135301000903798794/tfVQoSZpkXvLUOTlyqt0C1zY7IPEFfwVUDewg50Fh9yJBzmQ7JliXpoxbHulxNWIJeY4

Targets

    • Target

      https://anonfiles.com/veD8905azb/CleanerPRO_exe

    • 44Caliber

      An open source infostealer written in C#.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks