General

  • Target

    6bd2d0c64ce33ca5522c34a8927db8dd

  • Size

    274KB

  • Sample

    231222-fmwxpsfggn

  • MD5

    6bd2d0c64ce33ca5522c34a8927db8dd

  • SHA1

    370a93b652c6d566c5921d727e298adf9640aa87

  • SHA256

    d17470457a84cb120cf0fde0c405ae82a954c39534368e2cb9c6798823c69fe3

  • SHA512

    3275e4de111ff3da91b5c53c1d4124bf536f436c763b072f574d19f8f43c88e95d614915ebb73876d68086b3bc4eddc60fabd1e5ca428f56e3e37d922b3ff3f4

  • SSDEEP

    6144:Mf+BLtABPD9NF/DVGK7zeNL+wN41V6GIeyXGRA1D0nmG:KNKK7zeNLXY69eyXL1DdG

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/882980614087794780/2EXTWMBoMH9DQog67zK2ten38diDtxtqRM8VZIXtVQBTQ1ytliHQMSQQ6ozPiihxhSIW

Targets

    • Target

      6bd2d0c64ce33ca5522c34a8927db8dd

    • Size

      274KB

    • MD5

      6bd2d0c64ce33ca5522c34a8927db8dd

    • SHA1

      370a93b652c6d566c5921d727e298adf9640aa87

    • SHA256

      d17470457a84cb120cf0fde0c405ae82a954c39534368e2cb9c6798823c69fe3

    • SHA512

      3275e4de111ff3da91b5c53c1d4124bf536f436c763b072f574d19f8f43c88e95d614915ebb73876d68086b3bc4eddc60fabd1e5ca428f56e3e37d922b3ff3f4

    • SSDEEP

      6144:Mf+BLtABPD9NF/DVGK7zeNL+wN41V6GIeyXGRA1D0nmG:KNKK7zeNLXY69eyXL1DdG

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks