General

  • Target

    Softcoreinstall.exe

  • Size

    274KB

  • Sample

    240309-wkkpnaeg2y

  • MD5

    6d36919d059547c600e70d251864b691

  • SHA1

    5571a82c4fb5274e5d858448e51fca045c89c01c

  • SHA256

    cea25234ff6e1e950f760167de3dc0df47c921914cd81cb340d0d9af1ecf9b4c

  • SHA512

    c329d8929216e2f8c500c26d310c4b137385dd8e24d214feffcac79ac9e8e008f8c0909f83d80e27a76f8b4c0710b566e3dc4489172aa125cbf876ae659eaab9

  • SSDEEP

    6144:mf+BLtABPDFcYumU1SZedpXyEq11afTy4lI1D0hVw:kcNS0dpXyEqJF1Dow

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1215016857619275786/muCuwo2orfQ-J7FphyDUzXj-bBoSq2lVyekxXRaivuh5cbtqNobITDwhhjVdafZFaU9y

Targets

    • Target

      Softcoreinstall.exe

    • Size

      274KB

    • MD5

      6d36919d059547c600e70d251864b691

    • SHA1

      5571a82c4fb5274e5d858448e51fca045c89c01c

    • SHA256

      cea25234ff6e1e950f760167de3dc0df47c921914cd81cb340d0d9af1ecf9b4c

    • SHA512

      c329d8929216e2f8c500c26d310c4b137385dd8e24d214feffcac79ac9e8e008f8c0909f83d80e27a76f8b4c0710b566e3dc4489172aa125cbf876ae659eaab9

    • SSDEEP

      6144:mf+BLtABPDFcYumU1SZedpXyEq11afTy4lI1D0hVw:kcNS0dpXyEqJF1Dow

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks