General

  • Target

    f3d648c4f3a0f9cfbead90e546efe8f6_JaffaCakes118

  • Size

    274KB

  • Sample

    240416-tl68yaed74

  • MD5

    f3d648c4f3a0f9cfbead90e546efe8f6

  • SHA1

    cba4d6e13b5f1e766914ef65ff50c19bb295c17f

  • SHA256

    cd80318bc4c724934435231e72cbf7cbf5942df8b36e480603237e2ed08d4a93

  • SHA512

    bdeae22637a4be786fe8c4ef59ef35aeb4de2c339fc1728c47a8fd148528cb4ab92f84e6839727275f2d14d131a95d477ee50b8800aaa17a538f8bef1c04b213

  • SSDEEP

    6144:Rf+BLtABPD9NF/DVGK7zeNL+dN41V6GIeyXiRA1D0bBi:HNKK7zeNL2Y69eyXH1Dai

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/877106556905328661/OyLkuIbHolsGkE_Gsdhp8C-pOzTVH86ebFWF0y5BTWS_pIz1kXoCYdJjwftfW7KLWuy0

Targets

    • Target

      f3d648c4f3a0f9cfbead90e546efe8f6_JaffaCakes118

    • Size

      274KB

    • MD5

      f3d648c4f3a0f9cfbead90e546efe8f6

    • SHA1

      cba4d6e13b5f1e766914ef65ff50c19bb295c17f

    • SHA256

      cd80318bc4c724934435231e72cbf7cbf5942df8b36e480603237e2ed08d4a93

    • SHA512

      bdeae22637a4be786fe8c4ef59ef35aeb4de2c339fc1728c47a8fd148528cb4ab92f84e6839727275f2d14d131a95d477ee50b8800aaa17a538f8bef1c04b213

    • SSDEEP

      6144:Rf+BLtABPD9NF/DVGK7zeNL+dN41V6GIeyXiRA1D0bBi:HNKK7zeNL2Y69eyXH1Dai

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks