Analysis

  • max time kernel
    127s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2024 17:28

General

  • Target

    Robux.exe

  • Size

    274KB

  • MD5

    b3dca103204683157780d5562579d100

  • SHA1

    61a249df0a3ce1849b7047e252a323c9f26e44c4

  • SHA256

    8077c458cca5d446d5699c86d18cd2ed03507f59ab09582a1147e17291f33c65

  • SHA512

    89c4335aafa72a286b34460790abe4aa9e035db269f9b5e451a85c98326aa87b31d60a6742125011a54f421283e11cc5cf56d7fccfdcdff95d36dac21abec556

  • SSDEEP

    6144:Af+BLtABPDOpJTNN6eTSUdZ/pOlYeJqlA1D0FkB:ppYSSUdZ/olYet1DHB

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/915691701547446283/wUW0ZMfS9Ea3nfJC3GBW1nyVurXzKmQnFhIAcuEwGucZF2JJhh8YakLcl2RpJb6iFOek

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Robux.exe
    "C:\Users\Admin\AppData\Local\Temp\Robux.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    735B

    MD5

    3fb84e8134965d11d5ef8bdbdda94464

    SHA1

    37780e672aca9f37b3235ab5d3e131b5228dd979

    SHA256

    f6992a03a245ca075c97d44b3dccc0a48bb19950c59d13703718843279744c57

    SHA512

    1c78df9f46be7315a474f05d48e1f343e47ef87858fd2498104660aa06723125aef32b1be1a590367968367a41d24ab1e9d1775b35b1a1018350a2a290bd442f

  • C:\Users\Admin\AppData\Local\44\Process.txt

    Filesize

    1KB

    MD5

    250ced268cbea0a9a96a4ae7f61217c4

    SHA1

    e65dc68250a791e7a0c7acab1ddac719f64107fa

    SHA256

    f1ad8c6f17aceb2ac1ddee1700b4d21b0d37715e8a13cd2c8a2f573394b7845b

    SHA512

    b7a20b7f9f4b7067f7bf47bb6536f954269dd5df9276ab2910e48c5f1a39ad23c1993ba7a41622092bc5e24d85f99613aaf7c71660b663fb9250bf1cc6a34dba

  • memory/3248-0-0x000001A803160000-0x000001A8031AA000-memory.dmp

    Filesize

    296KB

  • memory/3248-32-0x000001A81D690000-0x000001A81D6A0000-memory.dmp

    Filesize

    64KB

  • memory/3248-26-0x00007FF9616D0000-0x00007FF962191000-memory.dmp

    Filesize

    10.8MB

  • memory/3248-125-0x00007FF9616D0000-0x00007FF962191000-memory.dmp

    Filesize

    10.8MB