General

  • Target

    aimware.exe

  • Size

    1.0MB

  • Sample

    240413-qlz8vadg33

  • MD5

    f0aa774656a99e218a7e2fc2c82cd2f3

  • SHA1

    68043818157f185f44cf1ee5b1096eaa65523f11

  • SHA256

    ac4480726395424221a325673e03466a459dac2f3168a8f15f6bf2edfb5ecf0e

  • SHA512

    20bc54f6870cf3973a5d33ce1e4377e2bb84a05b2ea525da6a325cdd3140ee57490f79ca3e6871ac70d45c66e038bccda93ca34878494f285ca6c6a149c2a8c4

  • SSDEEP

    24576:jBkVdlYAKfUYd3/4+FjrKgF5nmsQEf21ucm:FsvHYS+FXPnyO2Icm

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1223534684466712578/OJzM_W-KXB6Dm5WRjG1g7FlWhDxGAwBV4ZXWD3CYjtrvY6z0qkodyZAKKulSwJIUxlGT

Targets

    • Target

      aimware.exe

    • Size

      1.0MB

    • MD5

      f0aa774656a99e218a7e2fc2c82cd2f3

    • SHA1

      68043818157f185f44cf1ee5b1096eaa65523f11

    • SHA256

      ac4480726395424221a325673e03466a459dac2f3168a8f15f6bf2edfb5ecf0e

    • SHA512

      20bc54f6870cf3973a5d33ce1e4377e2bb84a05b2ea525da6a325cdd3140ee57490f79ca3e6871ac70d45c66e038bccda93ca34878494f285ca6c6a149c2a8c4

    • SSDEEP

      24576:jBkVdlYAKfUYd3/4+FjrKgF5nmsQEf21ucm:FsvHYS+FXPnyO2Icm

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks