General

  • Target

    09ea3bf729f8c7d94be749b3c40de16b5795cf015e971164bb49168841917e06

  • Size

    274KB

  • MD5

    15e2a8fb387c0d282a42769bf706302a

  • SHA1

    a3e079ec5d06a3a9b93c1f72c39ca0c83b17710d

  • SHA256

    09ea3bf729f8c7d94be749b3c40de16b5795cf015e971164bb49168841917e06

  • SHA512

    5fa9dd312f22d9ac36ee8b29fcb77bf8621ed3cb95496a4c6ff91437efa25cde672794ccc3f19c26a40988de17fb04798f77fb867a0b4f3822cfe3b71ae83653

  • SSDEEP

    6144:Cf+BLtABPDsJJfbdrJwiU0xoZZafTyMlI1D0qY/:NJXqiU0xoRh1Da/

Score
10/10

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1160315256816554056/hlmTbenc8kZjs5SjhnARiVDXgoYJyFGIFGn6fTzvVyQv0AD0YdC5k0StuqiH0Q3QAxBA

Signatures

  • 44caliber family
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables Discord URL observed in first stage droppers 1 IoCs
  • Detects executables referencing Discord tokens regular expressions 1 IoCs
  • Detects executables referencing credit card regular expressions 1 IoCs
  • Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 09ea3bf729f8c7d94be749b3c40de16b5795cf015e971164bb49168841917e06
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections