Resubmissions

08-07-2024 08:24

240708-kasrqs1ajl 10

08-07-2024 08:21

240708-j9brtssfpf 10

General

  • Target

    SolaraBootstrapper.exe

  • Size

    304KB

  • Sample

    240708-j9brtssfpf

  • MD5

    57e127da218cf91a3bd38b177099edad

  • SHA1

    40138b9611a8bc7dddc94bccd6d3847ca8ab881d

  • SHA256

    470914ddf3d824016ea5d00527b72f28e848ba4ef5cc48fc2d8ec65ca8d1f50d

  • SHA512

    55978686bdf56f7a9f1e9209d77494320390cb6ee5175de728028a7602e1e4c7624196eb5c6b8735f4b4b15dd132d1df8491d166f832580c6a2abeec460b4ef4

  • SSDEEP

    6144:q/oT6MDdbICydeBrdEGHpcJWba23UVt3QA8e0F5B:q/WJEGHpQWeGUVtj8eUB

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1259774804534497342/8EZmH3dK1jU0Q5PXQDVD0hawjscINRdEpoQ85BKJvoPo3stGWAfUJE7lZN4wJCUTHdnG

Targets

    • Target

      SolaraBootstrapper.exe

    • Size

      304KB

    • MD5

      57e127da218cf91a3bd38b177099edad

    • SHA1

      40138b9611a8bc7dddc94bccd6d3847ca8ab881d

    • SHA256

      470914ddf3d824016ea5d00527b72f28e848ba4ef5cc48fc2d8ec65ca8d1f50d

    • SHA512

      55978686bdf56f7a9f1e9209d77494320390cb6ee5175de728028a7602e1e4c7624196eb5c6b8735f4b4b15dd132d1df8491d166f832580c6a2abeec460b4ef4

    • SSDEEP

      6144:q/oT6MDdbICydeBrdEGHpcJWba23UVt3QA8e0F5B:q/WJEGHpQWeGUVtj8eUB

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks