General

  • Target

    42f3ef59924620b6860e51162b1c48e8_JaffaCakes118

  • Size

    252KB

  • Sample

    240713-xp91savhmc

  • MD5

    42f3ef59924620b6860e51162b1c48e8

  • SHA1

    38fa893b074d5db0ab16962fc99a935b7a60f9b4

  • SHA256

    c384c90952b58f1bae1104c9c1898ab43454f922b1eb2c482042405e83442290

  • SHA512

    1c38fa8ecdd20e4f4557146dcc8f905ae519373946dd5975088638b1744b63b06c10256728b2ddaaf00c8fd77830ed5664bfce7725a971bb5aa915b95aba04e2

  • SSDEEP

    6144:Ru0YFP5mhBs1PbSG6ny/VKlms0XC2FLk78kZ:008gOlL/VGn0SFwk

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/893708789679783947/dTZTjfGIFQXCZUzJQr5UmJ8mioHm5Q4KHpMoDrD6Up9yDL0gaeuxdBoE-CeC61m6fBY2

Targets

    • Target

      42f3ef59924620b6860e51162b1c48e8_JaffaCakes118

    • Size

      252KB

    • MD5

      42f3ef59924620b6860e51162b1c48e8

    • SHA1

      38fa893b074d5db0ab16962fc99a935b7a60f9b4

    • SHA256

      c384c90952b58f1bae1104c9c1898ab43454f922b1eb2c482042405e83442290

    • SHA512

      1c38fa8ecdd20e4f4557146dcc8f905ae519373946dd5975088638b1744b63b06c10256728b2ddaaf00c8fd77830ed5664bfce7725a971bb5aa915b95aba04e2

    • SSDEEP

      6144:Ru0YFP5mhBs1PbSG6ny/VKlms0XC2FLk78kZ:008gOlL/VGn0SFwk

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks