General

  • Target

    e16ee052369026471a2217cb65ee506b

  • Size

    6.0MB

  • Sample

    240327-memgmaaa48

  • MD5

    e16ee052369026471a2217cb65ee506b

  • SHA1

    60105513f4f77d0ecad47e0aed4c66ab3e35251b

  • SHA256

    9df1a60a4b1b87e74e49523d5f16f4a13526e9b993839aec7c887a063453fdfa

  • SHA512

    48bfd72ec18fa02eeb1834f09692032d0cf28ce4f36d8a14e34b81c1d825a5a7ced42709293a690c97a88266fb0249d2901f2313e9f200f46ce66b57bdf0ac36

  • SSDEEP

    98304:kT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnN6:018S6ZyKJz+ezUHQtBE

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/871356915303710720/aJQeq8OY3wwqIiXWkN97pUlIjJQhxawbR5zbwOuO96jrzWKG4INekUUjRxLOjy9VbIsi

Targets

    • Target

      e16ee052369026471a2217cb65ee506b

    • Size

      6.0MB

    • MD5

      e16ee052369026471a2217cb65ee506b

    • SHA1

      60105513f4f77d0ecad47e0aed4c66ab3e35251b

    • SHA256

      9df1a60a4b1b87e74e49523d5f16f4a13526e9b993839aec7c887a063453fdfa

    • SHA512

      48bfd72ec18fa02eeb1834f09692032d0cf28ce4f36d8a14e34b81c1d825a5a7ced42709293a690c97a88266fb0249d2901f2313e9f200f46ce66b57bdf0ac36

    • SSDEEP

      98304:kT1v0Sc5LEgwytj2KJHZpz+v2zU0XWbbr5vMjl2iQu9ntFEPZ8YGpnN6:018S6ZyKJz+ezUHQtBE

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks