General

  • Target

    4e896524210ad3a26c70e5b835a7f791.exe

  • Size

    598KB

  • Sample

    240109-xfdk8ahde4

  • MD5

    4e896524210ad3a26c70e5b835a7f791

  • SHA1

    56266f2cfcccaadd39a76fd2b71f776d81777f7e

  • SHA256

    9aa6cc584cb71f79cd0bed533930514f04b3f1f84163cd0fa5808e6d88d26362

  • SHA512

    bfa8ed75ec6da65875ca654092930cd3ebac0f8e8f2c1650c9dc67e570de5f4622edd20d4b7398365e0bcba2e52c8b5214221fd347c296065bbc40913ea046de

  • SSDEEP

    12288:1tqe3zJK6Y69eyXf1DBLP/NtvEbCzCo06qVwe6FQp9ioP0:bdI6F3PTsbCx06qH6F4RP

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/855417360688480256/JUyPPd3soXD0X_vllpMQMEAEAMSAs1J4iX2r2jRuXhB3kX2tHimYk-jMIi71U29HYoiG

Targets

    • Target

      4e896524210ad3a26c70e5b835a7f791.exe

    • Size

      598KB

    • MD5

      4e896524210ad3a26c70e5b835a7f791

    • SHA1

      56266f2cfcccaadd39a76fd2b71f776d81777f7e

    • SHA256

      9aa6cc584cb71f79cd0bed533930514f04b3f1f84163cd0fa5808e6d88d26362

    • SHA512

      bfa8ed75ec6da65875ca654092930cd3ebac0f8e8f2c1650c9dc67e570de5f4622edd20d4b7398365e0bcba2e52c8b5214221fd347c296065bbc40913ea046de

    • SSDEEP

      12288:1tqe3zJK6Y69eyXf1DBLP/NtvEbCzCo06qVwe6FQp9ioP0:bdI6F3PTsbCx06qH6F4RP

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks