General

  • Target

    40e3881d6c0898f6a5c24940b54a69a2.bin

  • Size

    111KB

  • Sample

    231011-ztbpwseg92

  • MD5

    93173ab8f2835a314e2cdfd2232d7abe

  • SHA1

    f9e1f81a4200f24dccef81f8fc94d6ed246f2cbb

  • SHA256

    4ea469510ab54fc467022a806c7a88f739412f48f9d432f8c93202199174aa09

  • SHA512

    e9f1852b72206c7cb7f048d38c8a8e6739814fbc01231fce8a6ab468ade8a9de7698608125eb17977ef34ee841e10defcddedb12258bac44321b196176ffdbb2

  • SSDEEP

    1536:G/SiV4V7QREcZwBHxMNdkG3A+SfEXBA0C9ySQF/Ze58qpTpGNQdZISm0CEIi/y3K:edVvECwtxMNdk+rSfPPQ/ZVKcICEIi/N

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1155120137612034188/cdy5wHbWmzOOyiX6nZbn5OlBuBidB8er7f1281hl7JRUP1iVFGnh9s57SwGqJtsdtgrx

Targets

    • Target

      d5c05da57fa20048e35e6ef498b3dd0bcb92eaea3997e8a7009b38b8a15c4e86.exe

    • Size

      274KB

    • MD5

      40e3881d6c0898f6a5c24940b54a69a2

    • SHA1

      f3da392ee4fb703255eff7ee8a83f23c2bb02987

    • SHA256

      d5c05da57fa20048e35e6ef498b3dd0bcb92eaea3997e8a7009b38b8a15c4e86

    • SHA512

      9013a696cda9be776f0a5ee66aece8716662121e69c5be056c8567eabed8fea91641e50714962438efb57da1b1ff1d4a2c3211e65be10a9e7833e647f700eb8b

    • SSDEEP

      6144:ef+BLtABPDMtBBfn1Y0gIoHOQZafTy8lI1D0Cbg:1tVvgIoHO+x1DRg

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks