General

  • Target

    7a4520a5b7cb55ca8a4137be525703ca

  • Size

    9.5MB

  • Sample

    231226-s92spageb9

  • MD5

    7a4520a5b7cb55ca8a4137be525703ca

  • SHA1

    307f0281d899630f6d2e7988a6570192a24b092e

  • SHA256

    e0166af88734a1ad71aa1dc6e18fbd4db40d5ab2177547d0091aa6202efc3c4a

  • SHA512

    e98d2a34f046f8eb4898cc6bb0820ab6655e862a31a9b4696e712994dc39d84a01af879ecedd640c0c333557b2f6639fc9dfc1930fab4f7a6a23c11641249813

  • SSDEEP

    196608:WFSJAB+ZcpS+S6SrGTsD2dmmhGlkrwPgZS7rjsn6P44Nm0:WFS+Bkc0+Fe6dmracMR70

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/868513655556292688/7ViWQKXofSCTi8VWoHEcGeQK61RUEBYfnsE72cu6TJnpHYwlgzbrVI5gQn_jpfUMFoS5

Targets

    • Target

      7a4520a5b7cb55ca8a4137be525703ca

    • Size

      9.5MB

    • MD5

      7a4520a5b7cb55ca8a4137be525703ca

    • SHA1

      307f0281d899630f6d2e7988a6570192a24b092e

    • SHA256

      e0166af88734a1ad71aa1dc6e18fbd4db40d5ab2177547d0091aa6202efc3c4a

    • SHA512

      e98d2a34f046f8eb4898cc6bb0820ab6655e862a31a9b4696e712994dc39d84a01af879ecedd640c0c333557b2f6639fc9dfc1930fab4f7a6a23c11641249813

    • SSDEEP

      196608:WFSJAB+ZcpS+S6SrGTsD2dmmhGlkrwPgZS7rjsn6P44Nm0:WFS+Bkc0+Fe6dmracMR70

    • 44Caliber

      An open source infostealer written in C#.

    • Stops running service(s)

    • Modifies file permissions

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks