General

  • Target

    705927ee5d2f040542d751bf7fdc9507

  • Size

    3.2MB

  • Sample

    231219-wkavfshecm

  • MD5

    705927ee5d2f040542d751bf7fdc9507

  • SHA1

    af6d69dc1f71db1a1665d9cf2f0244ba66af09f0

  • SHA256

    a02597bfc372534884c7ce8bcab08d0c09c3d52cd8eef83b9b90115bc97a402c

  • SHA512

    507403aa3bcdb02778e19efb3bd2b0c12bb6d2a7e0a0d86c0e09c0891e873e26551b169fc5178675fbe5e80784d07a50296d8b5719192df8847b9bf0e9644409

  • SSDEEP

    98304:Rv2SvaBNcLJgOhxEZv140mwijiXQjv4Fg:0AyNcmsE/4hjiXQjgS

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/894942702326677514/imJ4lUzTMjTxjg87EEJcDzxrAj6U6amcp4yRwcfUvSVVePmrzxPj_IrqfdM_lnSBl-27

Targets

    • Target

      705927ee5d2f040542d751bf7fdc9507

    • Size

      3.2MB

    • MD5

      705927ee5d2f040542d751bf7fdc9507

    • SHA1

      af6d69dc1f71db1a1665d9cf2f0244ba66af09f0

    • SHA256

      a02597bfc372534884c7ce8bcab08d0c09c3d52cd8eef83b9b90115bc97a402c

    • SHA512

      507403aa3bcdb02778e19efb3bd2b0c12bb6d2a7e0a0d86c0e09c0891e873e26551b169fc5178675fbe5e80784d07a50296d8b5719192df8847b9bf0e9644409

    • SSDEEP

      98304:Rv2SvaBNcLJgOhxEZv140mwijiXQjv4Fg:0AyNcmsE/4hjiXQjgS

    • 44Caliber

      An open source infostealer written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks