General

  • Target

    b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb

  • Size

    274KB

  • Sample

    231205-hllfpahh92

  • MD5

    57ccf63a7e54b14239f13b49c90c6624

  • SHA1

    dad4d1a51104b449f5c68d6e367c1e330c3d689b

  • SHA256

    b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb

  • SHA512

    4061844766b440f483bce85e900e1e121780eb57e7b47d7a13ddcd34c48de02bd9c55fc2350174e3efeeccecb6505d112feac8c8049414857e6f1d5fb90ef271

  • SSDEEP

    6144:uf+BLtABPDM5pPTgxWGomsXSb6WtafTy8lI1D0lvP:R57hmsXS6Yx1DSP

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1180235571138936842/0LJ571UFuTLaKpO7KBs12_uE0OnG-UkEHb7l8uaUnAlrrOyMv1lU6nnxKlX7bg-fad7L

Targets

    • Target

      b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb

    • Size

      274KB

    • MD5

      57ccf63a7e54b14239f13b49c90c6624

    • SHA1

      dad4d1a51104b449f5c68d6e367c1e330c3d689b

    • SHA256

      b1182007e714621a5ecbfd6fbe486889cd16c2099eea069ab787b8edeade1cdb

    • SHA512

      4061844766b440f483bce85e900e1e121780eb57e7b47d7a13ddcd34c48de02bd9c55fc2350174e3efeeccecb6505d112feac8c8049414857e6f1d5fb90ef271

    • SSDEEP

      6144:uf+BLtABPDM5pPTgxWGomsXSb6WtafTy8lI1D0lvP:R57hmsXS6Yx1DSP

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks