General

  • Target

    a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6

  • Size

    274KB

  • Sample

    240324-3ccseada5x

  • MD5

    0f62fa73ab2574ad652247b0d0c1d53b

  • SHA1

    9755b759767a62ee6f0d188fc0713b7d9f4da6c2

  • SHA256

    a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6

  • SHA512

    ba726cac73b9c5a491ba74cb61731d90da54ee9d709d6f08ea9bde41f5bd4cb6013de4e1e068df7ea29b12a9bb6d2dbb0cef2585057722f4260faf0cfe34d698

  • SSDEEP

    6144:cf+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGR1afTyElI1D0uwX:n161eO5rbHHsYqTXG9p1D2X

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1220750955448893500/rzVzB_J0mIM7yMj5hlY1HnUJ8dpAQ8Q15SDx6jq9JhiYRJikDTjetvA86KDH-S-q1sWM

Targets

    • Target

      a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6

    • Size

      274KB

    • MD5

      0f62fa73ab2574ad652247b0d0c1d53b

    • SHA1

      9755b759767a62ee6f0d188fc0713b7d9f4da6c2

    • SHA256

      a8f8537dd994c6405a155144f0ea72f66f95e0beb94c64ace5dcede4e405e3d6

    • SHA512

      ba726cac73b9c5a491ba74cb61731d90da54ee9d709d6f08ea9bde41f5bd4cb6013de4e1e068df7ea29b12a9bb6d2dbb0cef2585057722f4260faf0cfe34d698

    • SSDEEP

      6144:cf+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGR1afTyElI1D0uwX:n161eO5rbHHsYqTXG9p1D2X

    • 44Caliber

      An open source infostealer written in C#.

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables referencing Discord tokens regular expressions

    • Detects executables referencing credit card regular expressions

    • Detects executables referencing many VPN software clients. Observed in infosteslers

    • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks