General

  • Target

    leet-cheats-freeware.vmp.exe

  • Size

    6.9MB

  • Sample

    240515-ts35vshe36

  • MD5

    98396064f2a7683dcc23ba2dbdaac347

  • SHA1

    09d6c4ca59e59265b17d448e5e0c5887171f03e0

  • SHA256

    2dcfd9b32402fa9b0899100d5707b28552dc9d932548230af3aed4e2ae3c7bca

  • SHA512

    5b634afa4720a11e7e5fa5c2c7fb8a1b421f94fb116d252c7c27b74bfc16eb6a3353f47ab94bab77d4fa79a49570a8a770a4ba0372408be6ef9af8f131a7ffed

  • SSDEEP

    196608:D+Hi7E7LsX2GHY282Nhg5f4X6JiqO5ftIEDaajLeaK/mQ:aH74mGHQ2NmV4qJDO5ftYH/mQ

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1239998001162883183/Prdtl-xV5N5KoPdJjFyeakzF-tcDlNNdpgQa5_WSJhD6azfB04Gi-4sCmpkCOwJ_5MMR

Targets

    • Target

      leet-cheats-freeware.vmp.exe

    • Size

      6.9MB

    • MD5

      98396064f2a7683dcc23ba2dbdaac347

    • SHA1

      09d6c4ca59e59265b17d448e5e0c5887171f03e0

    • SHA256

      2dcfd9b32402fa9b0899100d5707b28552dc9d932548230af3aed4e2ae3c7bca

    • SHA512

      5b634afa4720a11e7e5fa5c2c7fb8a1b421f94fb116d252c7c27b74bfc16eb6a3353f47ab94bab77d4fa79a49570a8a770a4ba0372408be6ef9af8f131a7ffed

    • SSDEEP

      196608:D+Hi7E7LsX2GHY282Nhg5f4X6JiqO5ftIEDaajLeaK/mQ:aH74mGHQ2NmV4qJDO5ftYH/mQ

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks