General

  • Target

    b590138675ad5aa75e4753edfebab622

  • Size

    1.4MB

  • Sample

    240305-yy1zxahb72

  • MD5

    b590138675ad5aa75e4753edfebab622

  • SHA1

    124eec668e6dc1bd1e4908089f5c874fd1a45937

  • SHA256

    9a3116e6c3d151a200859719980ee4cf2487217562312757b754774d266ca5b8

  • SHA512

    3f038e7dd129da5a2842abf7d37969e82ed9d30e89d611e8ca1f5b86098f4a8e6ae719826cabc43641bd5bd6cb047ad967ce8ae293f760755f64f5cae9370b9d

  • SSDEEP

    24576:4vNIdb2DCPejfNy2Xp5nJdyEgBvKyNCkOxTsVTIAq2G4vXuQU5v8vJHLZRFe7JFf:8Nwb2uWJy2Xp5J4hRzNDaYIGGIXuQ8Q4

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/873463242905755648/toN0X9zZYgcbFlkZ7jCqLk4I_sGhgsbHl5HJ9jgcfMn_Sw0HRHJneP9bBZz01msNSKLJ

Targets

    • Target

      b590138675ad5aa75e4753edfebab622

    • Size

      1.4MB

    • MD5

      b590138675ad5aa75e4753edfebab622

    • SHA1

      124eec668e6dc1bd1e4908089f5c874fd1a45937

    • SHA256

      9a3116e6c3d151a200859719980ee4cf2487217562312757b754774d266ca5b8

    • SHA512

      3f038e7dd129da5a2842abf7d37969e82ed9d30e89d611e8ca1f5b86098f4a8e6ae719826cabc43641bd5bd6cb047ad967ce8ae293f760755f64f5cae9370b9d

    • SSDEEP

      24576:4vNIdb2DCPejfNy2Xp5nJdyEgBvKyNCkOxTsVTIAq2G4vXuQU5v8vJHLZRFe7JFf:8Nwb2uWJy2Xp5J4hRzNDaYIGGIXuQ8Q4

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks