General

  • Target

    0x00300000000139f5-5.dat

  • Size

    251KB

  • Sample

    231126-a4bp7sea8s

  • MD5

    513286e3e241f1c93556f45db4f8dc23

  • SHA1

    32c83261b6ac5663e91664764aab429e6cd424d1

  • SHA256

    a46070cb169ed0754c0fb624ad29f59fbc66fb75df9d2b3daefda76bc0d0d893

  • SHA512

    890a2d7a72cf9975ebd716ad3c6f05f595afd1218106054c3c33ff1b9d41baf52c0013b8f65d975d372151b3303311f6554cb412fbcbbb0cf01dc8e81109f693

  • SSDEEP

    3072:CF7zU2iSjjusPFspsXuZgPBU13oNod6bc82hfZRO6FYSZUjBs8R5JCXfhI/KQ73h:azUyjHsmPBUqN26bjYRrFYSeprZ

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1162710207558852689/c241__Tv-C5fSE0jsivUVIhYUTy9AQG_2q-Wedc4i61WcTidBFF8dAoQzbri3Cz5u5KI

Targets

    • Target

      0x00300000000139f5-5.dat

    • Size

      251KB

    • MD5

      513286e3e241f1c93556f45db4f8dc23

    • SHA1

      32c83261b6ac5663e91664764aab429e6cd424d1

    • SHA256

      a46070cb169ed0754c0fb624ad29f59fbc66fb75df9d2b3daefda76bc0d0d893

    • SHA512

      890a2d7a72cf9975ebd716ad3c6f05f595afd1218106054c3c33ff1b9d41baf52c0013b8f65d975d372151b3303311f6554cb412fbcbbb0cf01dc8e81109f693

    • SSDEEP

      3072:CF7zU2iSjjusPFspsXuZgPBU13oNod6bc82hfZRO6FYSZUjBs8R5JCXfhI/KQ73h:azUyjHsmPBUqN26bjYRrFYSeprZ

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks