General

  • Target

    Wave.exe

  • Size

    274KB

  • Sample

    240428-2kfnlaah72

  • MD5

    09a0ec3acb93c6d59932525a2e497398

  • SHA1

    e4ea0facd84f072785f008fb1f6cfcfca914e872

  • SHA256

    ff70fe25d30b5252ffc9e083187f1091c2d18e7b33f9c4bf8abd87906a252cc7

  • SHA512

    b80374b596d2bcfb9b0d07daa9712e095f67b7ce0140a8a5567a5906a64f819c3f46806e95fa60d3f6170e444a25ff4005d45fad702c7addcddba933843d19e7

  • SSDEEP

    6144:0f+BLtABPDMZZzIlzcwKUfmBnxafTy8lI1D0NZv:jZOnKUfmBXx1DUv

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1234062798355431434/JlB7QAXe-wioFkoPtDp2B4GwdSHNOtJbalU_YUgkqCeZlhZBcGaQKTH272rVMLbnp5dM

Targets

    • Target

      Wave.exe

    • Size

      274KB

    • MD5

      09a0ec3acb93c6d59932525a2e497398

    • SHA1

      e4ea0facd84f072785f008fb1f6cfcfca914e872

    • SHA256

      ff70fe25d30b5252ffc9e083187f1091c2d18e7b33f9c4bf8abd87906a252cc7

    • SHA512

      b80374b596d2bcfb9b0d07daa9712e095f67b7ce0140a8a5567a5906a64f819c3f46806e95fa60d3f6170e444a25ff4005d45fad702c7addcddba933843d19e7

    • SSDEEP

      6144:0f+BLtABPDMZZzIlzcwKUfmBnxafTy8lI1D0NZv:jZOnKUfmBXx1DUv

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks