General

  • Target

    864834b04458cd1d9962be39ff55aee3

  • Size

    275KB

  • Sample

    231226-xmkywabbcq

  • MD5

    864834b04458cd1d9962be39ff55aee3

  • SHA1

    984bcaf6e8ed6cc94937116556f8f585cb0f5417

  • SHA256

    f6e4515313b2edc227f40a55d731479f7ef7562b911ffc3f8058bfcf979d544b

  • SHA512

    8518bdc620c8de8f41f2b05aefa81114c0bcba4f7d03ebdcede97edffa1c6c4d7e57bbc0da4fd26642e601a470de91124ac260e50df2c64ec1e95aeb5000ceb2

  • SSDEEP

    6144:qf+BLtABPD9FBWKXsSlrVPl/9rHxlqQy8HRA190DuH:oFsSlrVPlJxlNyh19DH

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/870581345427005441/UjrKmnTLwya1NxpTUmifD6bHBh3H7Mn_MRUKUdVkdaAZA7DCMhJguLjz7KVW5wv2RDfj

Targets

    • Target

      864834b04458cd1d9962be39ff55aee3

    • Size

      275KB

    • MD5

      864834b04458cd1d9962be39ff55aee3

    • SHA1

      984bcaf6e8ed6cc94937116556f8f585cb0f5417

    • SHA256

      f6e4515313b2edc227f40a55d731479f7ef7562b911ffc3f8058bfcf979d544b

    • SHA512

      8518bdc620c8de8f41f2b05aefa81114c0bcba4f7d03ebdcede97edffa1c6c4d7e57bbc0da4fd26642e601a470de91124ac260e50df2c64ec1e95aeb5000ceb2

    • SSDEEP

      6144:qf+BLtABPD9FBWKXsSlrVPl/9rHxlqQy8HRA190DuH:oFsSlrVPlJxlNyh19DH

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.