Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 10:33
Behavioral task
behavioral1
Sample
caliber.exe
Resource
win7-20230831-en
General
-
Target
caliber.exe
-
Size
274KB
-
MD5
51ef1b5bd832c2dd5527026a2c8385dd
-
SHA1
f4cdb36b3bb2f7cb8328f7821a6c9f1a67abf69e
-
SHA256
efc7c7dd299cd861e9196153e2f42b0365c17f6ed2e1336c0aa8b14342d4069e
-
SHA512
b6e19a0a9e414c30388d4af1e9490547505de26eaedcb9ecf022b1b818073be8cb00cc96a63c1537caeebb5a6c4db635b801ee45e2815d3254374b93a52be631
-
SSDEEP
6144:jf+BLtABPDZ1o2NjNRScMH5cgowlqg0lI1D0oeB:51HocY5cgJ51DaB
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1122141363941679136/q6BCXosW-M2T548ZAXG2lmcxF3COhfB4HKP6TsvadEd_-GW37BPl1h9nkHpx_As2wrMj
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 freegeoip.app 2 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
caliber.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 caliber.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier caliber.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
caliber.exepid process 4944 caliber.exe 4944 caliber.exe 4944 caliber.exe 4944 caliber.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
caliber.exedescription pid process Token: SeDebugPrivilege 4944 caliber.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
738B
MD5a8bbef23c38a7e80c66ba39091fb7be9
SHA1af4ae161d0212303e03e789417ade744299d594e
SHA256ca115c9adac47f726f8239f9e4b0fe180a866c49257c6e654c4c7eb9c9ed05b8
SHA5122b670c2e913711392cf67c6e6b4c31c50b463c6c9e7233162f27d7ce10e5e4ad2a7ac32e155a756c201e63cc268942c9ba2d472ba65b0740cbe0f80f99586db7
-
Filesize
820B
MD5f697f9f9893a1f40c01f558e6aae3fad
SHA114d592f33d555e0481efebea4658c94f2be2712b
SHA25639f2f4cec69f758a3e2ed1e1c4179834727765861de2d2af5b21d0da0ccd8b49
SHA512ef5401bd4b2e8e912272db49082d7fddd84c61bfbf6e799a73dbc06cb902853d7e1fd23e34690932679466118f12383b5363a2f2a1675271f895a90cc7dbe49d
-
Filesize
820B
MD5f697f9f9893a1f40c01f558e6aae3fad
SHA114d592f33d555e0481efebea4658c94f2be2712b
SHA25639f2f4cec69f758a3e2ed1e1c4179834727765861de2d2af5b21d0da0ccd8b49
SHA512ef5401bd4b2e8e912272db49082d7fddd84c61bfbf6e799a73dbc06cb902853d7e1fd23e34690932679466118f12383b5363a2f2a1675271f895a90cc7dbe49d
-
Filesize
1KB
MD5d9ab86beb64c2158c496160f5daf7514
SHA198f199c04095216249db7bee5596efbf4053e1d9
SHA256eaa70f1b2af243c0255f20a548e39a548d96174109bd06e229709b3ad7a45789
SHA512e7308f532080234aec9af88fc00b346df26897ddc115d25fc5ada24a617d665615ce5672432f70a89108a3930d882d66924e8ccddb2f261bdc165bcb20dd1694