General

  • Target

    icode.exe

  • Size

    274KB

  • Sample

    240229-yl7a6abd35

  • MD5

    7fefc276f2e1ae851bef2b3be49ffa83

  • SHA1

    083df00bb408f94805ec1e9cfa70c95cccf1b4c7

  • SHA256

    b6d903a6675cad3991fc497696dd68fd108d835f577c2f97142593c2871461c7

  • SHA512

    4dd1b172b78b444a8a6ca6b3d5987dba30b85600eb97feb6e2ad90288e1d8fc7c1e49be0b9565bbf23ef4f8236e16407f6f671351f4ebc4604ae00bf3f592d7b

  • SSDEEP

    6144:5f+BLtABPDMtBBfn1Y0gIoHOQpafTyclI1D03e7:+tVvgIoHOOR1DF7

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1177318846365978644/WqRVEpWYXkvEShUxMDfFChXP4hGQTeq-WCw7kZXxlaQ3h4sSnNIoFPbGdna5FGYOsBPj

Targets

    • Target

      icode.exe

    • Size

      274KB

    • MD5

      7fefc276f2e1ae851bef2b3be49ffa83

    • SHA1

      083df00bb408f94805ec1e9cfa70c95cccf1b4c7

    • SHA256

      b6d903a6675cad3991fc497696dd68fd108d835f577c2f97142593c2871461c7

    • SHA512

      4dd1b172b78b444a8a6ca6b3d5987dba30b85600eb97feb6e2ad90288e1d8fc7c1e49be0b9565bbf23ef4f8236e16407f6f671351f4ebc4604ae00bf3f592d7b

    • SSDEEP

      6144:5f+BLtABPDMtBBfn1Y0gIoHOQpafTyclI1D03e7:+tVvgIoHOOR1DF7

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks