General

  • Target

    0d1ce9ec311262c574e65633549c9c4a

  • Size

    1.2MB

  • Sample

    231230-d45vtsdbdl

  • MD5

    0d1ce9ec311262c574e65633549c9c4a

  • SHA1

    541ba677282a00d73a18fc06123cf7c61a1d1f57

  • SHA256

    64f4e1cdebbb2d16e19e189aa15ac511039b998d837b04aa34fca073084af019

  • SHA512

    daa70c786ac049a18132718ec3bb05480cc97ff92419f9bb78614e93de2dff9c8d034c823ecad7a2323c52a554d83ee826d9c46e3a1c4942e842a3597074e96d

  • SSDEEP

    24576:0WJtTGnwqb3ZWZfbuoDGOkf/FaIGoXjTv:0WPTGnpb3ZKTue2dT

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/866738169181372456/leUwW_rAYekiwOVhgk8WOe6mYy271-wPgyPdfdgGkW3LvRIrgaePX3yC-m_SGyjcPYeJ

Targets

    • Target

      0d1ce9ec311262c574e65633549c9c4a

    • Size

      1.2MB

    • MD5

      0d1ce9ec311262c574e65633549c9c4a

    • SHA1

      541ba677282a00d73a18fc06123cf7c61a1d1f57

    • SHA256

      64f4e1cdebbb2d16e19e189aa15ac511039b998d837b04aa34fca073084af019

    • SHA512

      daa70c786ac049a18132718ec3bb05480cc97ff92419f9bb78614e93de2dff9c8d034c823ecad7a2323c52a554d83ee826d9c46e3a1c4942e842a3597074e96d

    • SSDEEP

      24576:0WJtTGnwqb3ZWZfbuoDGOkf/FaIGoXjTv:0WPTGnpb3ZKTue2dT

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks