General

  • Target

    c9c32665baa415f2483ef94eda102b67

  • Size

    6.0MB

  • Sample

    240314-19k4yaah79

  • MD5

    c9c32665baa415f2483ef94eda102b67

  • SHA1

    284e136d67aad1a7bea390cd9b5e37f3f67dc5d4

  • SHA256

    4494dc4430392f023d605a11d231d8ce99de3c3f15002eb0d19cf8e68bb91d51

  • SHA512

    125f56b799cf9e3573aace4f030bdfc7ad148b822613f5f6fe17664267381f080aa174f99658c06a9639068595304f2efadf854ecc8e8a05fb74d2e77502dae2

  • SSDEEP

    98304:lT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnNg:d18S6ZyKJz+ezUHQtBy

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/871356915303710720/aJQeq8OY3wwqIiXWkN97pUlIjJQhxawbR5zbwOuO96jrzWKG4INekUUjRxLOjy9VbIsi

Targets

    • Target

      c9c32665baa415f2483ef94eda102b67

    • Size

      6.0MB

    • MD5

      c9c32665baa415f2483ef94eda102b67

    • SHA1

      284e136d67aad1a7bea390cd9b5e37f3f67dc5d4

    • SHA256

      4494dc4430392f023d605a11d231d8ce99de3c3f15002eb0d19cf8e68bb91d51

    • SHA512

      125f56b799cf9e3573aace4f030bdfc7ad148b822613f5f6fe17664267381f080aa174f99658c06a9639068595304f2efadf854ecc8e8a05fb74d2e77502dae2

    • SSDEEP

      98304:lT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnNg:d18S6ZyKJz+ezUHQtBy

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks