General

  • Target

    NoteBook Vitax.exe

  • Size

    303KB

  • Sample

    240212-bxveeaef2w

  • MD5

    13de7fe5ae3ca94916e9a2388331ec5b

  • SHA1

    e5650b323a754a49a4c44d966513263224af48ce

  • SHA256

    8ff779c61ce341d779d71c4d907627b0a0fd33474ac6f5647fcb4484940a810b

  • SHA512

    1f7b8946c4d9aed25730dd9952cecb85ea960ca76e39b04d3589f01f44fa522b59af6a26d96821c481b2ce4d96c1f3753835ffdf1a94ec3406444c2331a96563

  • SSDEEP

    6144:kr+UT6MDdbICydeBwtgGJSTZsgPvur8mI1D0k2w:krNsgGJSdsrq1Duw

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1192867889502490784/d5b-GoiYJ0-udNuzCNlHbe17U050Uovs3ONP72ifR0EsXXp5DkvWjQWgRI59ylud8K6j

Targets

    • Target

      NoteBook Vitax.exe

    • Size

      303KB

    • MD5

      13de7fe5ae3ca94916e9a2388331ec5b

    • SHA1

      e5650b323a754a49a4c44d966513263224af48ce

    • SHA256

      8ff779c61ce341d779d71c4d907627b0a0fd33474ac6f5647fcb4484940a810b

    • SHA512

      1f7b8946c4d9aed25730dd9952cecb85ea960ca76e39b04d3589f01f44fa522b59af6a26d96821c481b2ce4d96c1f3753835ffdf1a94ec3406444c2331a96563

    • SSDEEP

      6144:kr+UT6MDdbICydeBwtgGJSTZsgPvur8mI1D0k2w:krNsgGJSdsrq1Duw

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Tasks