Analysis

  • max time kernel
    3s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2023 17:24

General

  • Target

    ebc6d55a45996861c5a84937d2a990da.exe

  • Size

    275KB

  • MD5

    ebc6d55a45996861c5a84937d2a990da

  • SHA1

    db9e42e191c95168d03274cc4d0ab18e35d3f314

  • SHA256

    42f1065841dc77643d3a3c33fb40de4c2931e3a4d15d9802fff0a194c821ea2b

  • SHA512

    927560123afb2d46c4a57065402182bf5522bc3be9d4d9593ec79d72eb4fdd12edc85dbe77d24e2801550bf1c09ac950521b52a62c384de2aad2304edf8db477

  • SSDEEP

    6144:Wf+BLtABPD9FBWKXsSlrVPl/9rHxlqQy8ERA190AxR:sFsSlrVPlJxlNyW19vR

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/869968115126128690/9HuocC8P0OFpxwEHR7UGW0ZtseqV8b95oQ9ExN0rHkwTjipAQLrkOqPzDiDXxXky3kUL

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ebc6d55a45996861c5a84937d2a990da.exe
    "C:\Users\Admin\AppData\Local\Temp\ebc6d55a45996861c5a84937d2a990da.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    127B

    MD5

    449bf5a2050fac2f6860315d81403eb8

    SHA1

    38a60a97b5c2161a2c60ab497ee18e5e876d0a9f

    SHA256

    6a72ab7d988ab20b3abfade936e8e3964aef993cf527d043296b1cef9ca0b55d

    SHA512

    c8bcdf8f293b991f258e23645b3094b7df4cf9ce2132e4dce9570ad80385f065ec6e80fb8a4c04aa6c57d408cc242415c05594199a8a5002148df77613eafb85

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    385B

    MD5

    9faf4403a63435d9eb46be9ede52f019

    SHA1

    19226a06a35e63dccca91bdb07581a05a1dc1e7a

    SHA256

    d9914872d01b10672170cbf842398dfd49b53f6d435f5428d4b360cc5d2ebcc5

    SHA512

    d6b856b1c5df6a3011514c15a566b0f9c6906fff4690af1e4fde9232c92dc94e871fd1c91cefe14c37e73b351e6394d2eec25e6df39029d51324976a0cbf0b67

  • memory/2360-0-0x0000000001320000-0x000000000136C000-memory.dmp

    Filesize

    304KB

  • memory/2360-2-0x000000001A880000-0x000000001A900000-memory.dmp

    Filesize

    512KB

  • memory/2360-1-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

    Filesize

    9.9MB

  • memory/2360-34-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

    Filesize

    9.9MB

  • memory/2360-63-0x000007FEF5C90000-0x000007FEF667C000-memory.dmp

    Filesize

    9.9MB