General

  • Target

    6a73b2e83b8267fc1b40cd1c42f59116

  • Size

    121KB

  • Sample

    240120-pwrh1sacg6

  • MD5

    6a73b2e83b8267fc1b40cd1c42f59116

  • SHA1

    bf63ed29fdeae42260eccbef0c511ee77f8f0339

  • SHA256

    0ffc4a30a0719e18e81d17c1aa2a0880ccde91f27a69ddc5682405037f41467b

  • SHA512

    8f3614e4d9a9baf4185cb2d2bdc19a937cdec9260a5dc9dbcdc5db2797d376dc093f2c2ebd55a427475644c2780655d1895a0f610133ce57d969ea46df9ec37a

  • SSDEEP

    1536:eNwXyLxpNnonJsrZ8/l+LguMSxPBuVWDaAruae9/gTlSmE8eLU534GwvfAeB+R0U:2hxp8JgZ29ubBOWwx9YD8jhvoo+RANG

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/857773959478116362/1HjPquy4G_ltau-JO_b28kVAgNjquEwJ8dvlwS9dY_P5TQ_PcQA7UEAQc80CznKxgRVd

Targets

    • Target

      6a73b2e83b8267fc1b40cd1c42f59116

    • Size

      121KB

    • MD5

      6a73b2e83b8267fc1b40cd1c42f59116

    • SHA1

      bf63ed29fdeae42260eccbef0c511ee77f8f0339

    • SHA256

      0ffc4a30a0719e18e81d17c1aa2a0880ccde91f27a69ddc5682405037f41467b

    • SHA512

      8f3614e4d9a9baf4185cb2d2bdc19a937cdec9260a5dc9dbcdc5db2797d376dc093f2c2ebd55a427475644c2780655d1895a0f610133ce57d969ea46df9ec37a

    • SSDEEP

      1536:eNwXyLxpNnonJsrZ8/l+LguMSxPBuVWDaAruae9/gTlSmE8eLU534GwvfAeB+R0U:2hxp8JgZ29ubBOWwx9YD8jhvoo+RANG

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks