General

  • Target

    incognito.rar

  • Size

    19.0MB

  • Sample

    240604-wnhdpsfc94

  • MD5

    aa41cee4f14534c10659eef1236b8bfd

  • SHA1

    1fc3dda350428358314045c0bc6cf3b53454111c

  • SHA256

    0737631afc73cb9df2de10bd081240bdb79efa2281725ba86d6bc96a79329377

  • SHA512

    79f77286a3828367710ec47d8eee90bd900e845aa40a2123453e9442a7b0b6f762f7ff2d932047f02e208af19d056d2aaf2a7f83c08afaa4decded073d79f30a

  • SSDEEP

    393216:2Hi4MRTC7hqZMsiwfvlGEZk8GPfN5kVwHCA0rvp9HG5YZr:DTM0jie7GPl5kV4Qbmil

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1247477719873359936/wrB74XRj4TlNQ2nBZ-UiFAKT5xaUPOYEcQERM4xeBMpOTpKIiACoITNRdXsYoHlUqHc-

Targets

    • Target

      incognito.exe

    • Size

      19.1MB

    • MD5

      eb4fb2a7c7b9baecd24417a1de212cb7

    • SHA1

      996a303e8b7d8b772aa691102085d0381a5f8e5e

    • SHA256

      ddce0c6cf20c0367d751d6219cb0a26f2e57f2015c950ed77c12581eb990a2ca

    • SHA512

      6a41b16297289e125758f6d070c924bdcca700bc705775191a282de2169b4e6a1ab40c4f95645aa79015d6e621d61c91b781f08a6de6f9521deccdd69d6e3b0e

    • SSDEEP

      393216:ypIkEfmNmTiBzRc+Ca/fJ+YZcgYTCwyDfBiHmIKOy8kCPI:JkMmai4aXJ+utYTny71Vr8kCPI

    • 44Caliber

      An open source infostealer written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks