General

  • Target

    8010a52546b7b4927e062e9f11d90cd4

  • Size

    1.2MB

  • Sample

    231226-vw28eaggdl

  • MD5

    8010a52546b7b4927e062e9f11d90cd4

  • SHA1

    e080c197ea3deba26b51b83d7d8fca65220c20b0

  • SHA256

    2b9acc15e272c93ebb1de7a8589d71bc0fef713bbcbd7d049960e4064d816c2b

  • SHA512

    35bc392fa40804224dedea630bc55aa9b2646b615268e1222fec1a9d46872b49b67beb2a40057c92588a3b28141d23815658ccece78182e411de1e97164550ee

  • SSDEEP

    24576:4IwdkMPH5dnYh6cBq0RQHD2MoulzpiwqdPrUPbBU5iuVAGU/f:JaZVw6cc7D2MJlztqVrUPb2km3U/f

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/866711810735996958/O6j2s0-Vj_HxOXRLkQqnJ3yalpf3Cuf5oOuopPL8nk4awQ3YRl6cndwNbPZLwQ8pLRY5

Targets

    • Target

      8010a52546b7b4927e062e9f11d90cd4

    • Size

      1.2MB

    • MD5

      8010a52546b7b4927e062e9f11d90cd4

    • SHA1

      e080c197ea3deba26b51b83d7d8fca65220c20b0

    • SHA256

      2b9acc15e272c93ebb1de7a8589d71bc0fef713bbcbd7d049960e4064d816c2b

    • SHA512

      35bc392fa40804224dedea630bc55aa9b2646b615268e1222fec1a9d46872b49b67beb2a40057c92588a3b28141d23815658ccece78182e411de1e97164550ee

    • SSDEEP

      24576:4IwdkMPH5dnYh6cBq0RQHD2MoulzpiwqdPrUPbBU5iuVAGU/f:JaZVw6cc7D2MJlztqVrUPb2km3U/f

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks