General

  • Target

    6602a6768c612807b54ad5e282106d80N.exe

  • Size

    303KB

  • Sample

    240716-ephmestgrq

  • MD5

    6602a6768c612807b54ad5e282106d80

  • SHA1

    554c249b0b54838ab326ced44234018e3d26f6a5

  • SHA256

    fd0c25564e7fe0dbc2aa456defdbb4c8e4d3e6768adbc72462e9a3b48e63cb47

  • SHA512

    f161c5a194abfbf43c9930b7f3e99b6b41edb4abc0520ee292fc6189ba95a9b87525526eb454e18537147e4bae51828a530155392628a8755c9a6d91691937d4

  • SSDEEP

    6144:20tC6MDdbICydeB25aBRH5QreWQAKAKtBvUEWA1D0xYqnT:20q/BRH5QyYKZ1DwHnT

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1261337809793581077/th-zisFe-ONOBv0rIRsugBNZzyStJ-lRYkNoNm0Wd0XiY_0pKxTkCodWZeXwnZ-c_zi5

Targets

    • Target

      6602a6768c612807b54ad5e282106d80N.exe

    • Size

      303KB

    • MD5

      6602a6768c612807b54ad5e282106d80

    • SHA1

      554c249b0b54838ab326ced44234018e3d26f6a5

    • SHA256

      fd0c25564e7fe0dbc2aa456defdbb4c8e4d3e6768adbc72462e9a3b48e63cb47

    • SHA512

      f161c5a194abfbf43c9930b7f3e99b6b41edb4abc0520ee292fc6189ba95a9b87525526eb454e18537147e4bae51828a530155392628a8755c9a6d91691937d4

    • SSDEEP

      6144:20tC6MDdbICydeB25aBRH5QreWQAKAKtBvUEWA1D0xYqnT:20q/BRH5QyYKZ1DwHnT

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks