General

  • Target

    2ba940cf9a7a31aa0cfc73f74e3482e4

  • Size

    3.1MB

  • Sample

    231225-tjkbdsece5

  • MD5

    2ba940cf9a7a31aa0cfc73f74e3482e4

  • SHA1

    2874764e864021db2985ff64ef8dd94d1957f3d8

  • SHA256

    9d4c0e742192d990d817e17aa3375658cb704ae49b81a0da85fe4b40fcd14465

  • SHA512

    443287c03e81ba5e0bcceef5a5381646579645342c618f86742297605a72537da4c07b86a8dfbf57d553b0f54351f44871f8cb4403179f051f8bcd2133ffcbfd

  • SSDEEP

    98304:6Syum4Rwim9q8GN0lEulzh5kte61nqkELcQ0p+IQ+SeEIRt:oUR1m9q8GMlzh5kksqDLAp+IZST8

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/867100509307142154/BMIycBNKWEMuXl991uUrUx-2sScTu3a04QCmMfOP8t-z9WEPTh8ZVkINTJPpUma2BdTD

Targets

    • Target

      2ba940cf9a7a31aa0cfc73f74e3482e4

    • Size

      3.1MB

    • MD5

      2ba940cf9a7a31aa0cfc73f74e3482e4

    • SHA1

      2874764e864021db2985ff64ef8dd94d1957f3d8

    • SHA256

      9d4c0e742192d990d817e17aa3375658cb704ae49b81a0da85fe4b40fcd14465

    • SHA512

      443287c03e81ba5e0bcceef5a5381646579645342c618f86742297605a72537da4c07b86a8dfbf57d553b0f54351f44871f8cb4403179f051f8bcd2133ffcbfd

    • SSDEEP

      98304:6Syum4Rwim9q8GN0lEulzh5kte61nqkELcQ0p+IQ+SeEIRt:oUR1m9q8GMlzh5kksqDLAp+IZST8

    • 44Caliber

      An open source infostealer written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks