General

  • Target

    loader.exe

  • Size

    274KB

  • Sample

    230831-fb7vtsdb28

  • MD5

    85b10f8d022b2b82aa276168da0950fe

  • SHA1

    f0ebbadf43bd9fbd5f93706aae076f89230a643b

  • SHA256

    fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

  • SHA512

    737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

  • SSDEEP

    6144:tf+BLtABPDV5pPQgxWGomsXSb6W9qgMlI1D0Zrj:P58hmsXS62h1Dej

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1136773243261427722/PblfbxA7GVJqBDdmJ8FJrCPSUvE8iRRElfnrMu-WTqPYsrO633tdDs3xiZCowAI13ArQ

Targets

    • Target

      loader.exe

    • Size

      274KB

    • MD5

      85b10f8d022b2b82aa276168da0950fe

    • SHA1

      f0ebbadf43bd9fbd5f93706aae076f89230a643b

    • SHA256

      fd45e5b2e40a6a427bc0b2caf7d546a63a632adaa4fe7cb70a9173f74c4c54e2

    • SHA512

      737fccf654e342818da06adfbfa724862d5c816551e110cf94f71313186b8dc19319dcbb26affe47a9a0f7c05ecaaa564d95d1a6a2fd7c6278bddaef9347c53b

    • SSDEEP

      6144:tf+BLtABPDV5pPQgxWGomsXSb6W9qgMlI1D0Zrj:P58hmsXS62h1Dej

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks