General

  • Target

    6e4b2af9613621fcf93169e9e675a83d

  • Size

    1.2MB

  • Sample

    240122-a9yrxschfq

  • MD5

    6e4b2af9613621fcf93169e9e675a83d

  • SHA1

    c73f05cc03da6fae9d02dae5c27a39ad27e614f8

  • SHA256

    699f85530a90e3aa36ff9e89dd99eb80c9c183e5b4051f05563519207a6f43f1

  • SHA512

    35a8322abfa612c2e26f1ba182ac9ec329d52f64d0e65957ab75e6e9e8c4b91f12dc7b654e63bcb635ed76cbae4a99c9cc3474ef68c447cb8b53a3f530e1130b

  • SSDEEP

    24576:BxvZEnWSE8QUvZE7ip4eTIFKEEHpded5mdKv1rVewecDM:BxvZEWeQuE7Mbpd4mqrJDM

Malware Config

Extracted

Family

44caliber

C2

https://ptb.discord.com/api/webhooks/860353023338086430/2Qd4HlzQHur0rzkKBP2Vm6f3rps1M95uCLN9BFhgxoNcoNZaddzQ1WGM0rfQd1x1RjdF

Targets

    • Target

      6e4b2af9613621fcf93169e9e675a83d

    • Size

      1.2MB

    • MD5

      6e4b2af9613621fcf93169e9e675a83d

    • SHA1

      c73f05cc03da6fae9d02dae5c27a39ad27e614f8

    • SHA256

      699f85530a90e3aa36ff9e89dd99eb80c9c183e5b4051f05563519207a6f43f1

    • SHA512

      35a8322abfa612c2e26f1ba182ac9ec329d52f64d0e65957ab75e6e9e8c4b91f12dc7b654e63bcb635ed76cbae4a99c9cc3474ef68c447cb8b53a3f530e1130b

    • SSDEEP

      24576:BxvZEnWSE8QUvZE7ip4eTIFKEEHpded5mdKv1rVewecDM:BxvZEWeQuE7Mbpd4mqrJDM

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks