Analysis

  • max time kernel
    7s
  • max time network
    23s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09-02-2024 08:52

General

  • Target

    Minty/Minty.exe

  • Size

    274KB

  • MD5

    6c10aa7f40c68f01050d041ab9c16417

  • SHA1

    8b447164852a63f79e276396649f98dfb955e053

  • SHA256

    db5cda1822fc9fa50bc6719d835d61692d936b674da3d840ba61ad1b11c616eb

  • SHA512

    9636f49c03203faf53e48945efb3e182ddbcbd143822f7c706d11164d2a1a7e86caa72d3eabf307616011b79fb00b35a894dc6055a2d1cfa9966183e96a12a31

  • SSDEEP

    6144:Bf+BLtABPDMZZzIlzcwKUfmBnxafTy8lI1D0zOy:uZOnKUfmBXx1DNy

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1205378577210548224/LNcoZrLKPyHLEN4pcKhtXlPWyk5g8jRNtbvhK_L1UGxjObYKgJwFG53LqgVJZWP5xjst

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Minty\Minty.exe
    "C:\Users\Admin\AppData\Local\Temp\Minty\Minty.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    740B

    MD5

    1a4028a6298947212a6b154b245fd79d

    SHA1

    dce73f162e12aa9dc9dfa12e1da690d5e24bf78b

    SHA256

    9e1197761b4f1480aee9954a7da012eba2d93d0296c35caa54e181eb86674a7e

    SHA512

    31fddf66b89ac32c1780e803c87c8403b67e87677ff093362b7e090ae90ab1efc759e567473d9071debe8b6aa1f038b7ceb5b49891350d4c708c32494bf38168

  • C:\Users\Admin\AppData\Roaming\44\Process.txt

    Filesize

    1KB

    MD5

    a5576a0aea77b49ca7b46316cd99709a

    SHA1

    7ed540928e053c2107b57bfba56c844e9dfc83c7

    SHA256

    bbd6561374dd928191e218c848a4159882197e0300a97daeef7472a77ea64957

    SHA512

    90797a371a405ea66f2f41a8c6307cdeab225d4dab23d7442b8985ce62a5109a4c77994452646c899dd6bae8a0a29c01c9dac123619b8379214a44c44dbf251a

  • memory/1460-0-0x000001FF31F90000-0x000001FF31FDA000-memory.dmp

    Filesize

    296KB

  • memory/1460-1-0x00007FFB99E90000-0x00007FFB9A952000-memory.dmp

    Filesize

    10.8MB

  • memory/1460-2-0x000001FF33D60000-0x000001FF33D70000-memory.dmp

    Filesize

    64KB

  • memory/1460-113-0x00007FFB99E90000-0x00007FFB9A952000-memory.dmp

    Filesize

    10.8MB