General

  • Target

    ad8bad1ca3c888140a267dab3ca32f40N.exe

  • Size

    303KB

  • Sample

    240805-tqhfdavglh

  • MD5

    ad8bad1ca3c888140a267dab3ca32f40

  • SHA1

    a8455a1023ca8b83b145669036eaf7e47fd23a4b

  • SHA256

    a8234940d8bae72c337c38780bbe79af9ff944282113daa64d7c18addbe019f3

  • SHA512

    d9522ee93908fb8b04d00a2ae0f79776f6570387ef625e0e46ffb34d185e2e25e753438ec92ed1d39ca6bd3c9ab777397e541facb087fe84852df064dabdc0f0

  • SSDEEP

    6144:15hxT6MDdbICydeBvQ26i2dVTZ867mA1D0FI6:15dY26i2vTGA1DR6

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1267879755852677195/gVzfD2x4tcYypDXASFDiRFPDc3XXIcfmVrwOtmb4OxjlfTTOMCCPvDvp3O4Y4cLpKKeR

Targets

    • Target

      ad8bad1ca3c888140a267dab3ca32f40N.exe

    • Size

      303KB

    • MD5

      ad8bad1ca3c888140a267dab3ca32f40

    • SHA1

      a8455a1023ca8b83b145669036eaf7e47fd23a4b

    • SHA256

      a8234940d8bae72c337c38780bbe79af9ff944282113daa64d7c18addbe019f3

    • SHA512

      d9522ee93908fb8b04d00a2ae0f79776f6570387ef625e0e46ffb34d185e2e25e753438ec92ed1d39ca6bd3c9ab777397e541facb087fe84852df064dabdc0f0

    • SSDEEP

      6144:15hxT6MDdbICydeBvQ26i2dVTZ867mA1D0FI6:15dY26i2vTGA1DR6

    • 44Caliber

      An open source infostealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Credentials from Password Stores

1
T1555

Credentials from Web Browsers

1
T1555.003

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Tasks