General

  • Target

    d9ccde3b728fba6d6e3f1b92c75a11a8.bin

  • Size

    1.2MB

  • Sample

    240821-cbdefavbjb

  • MD5

    5589a4d6c6e2a81620b68db4b5594b32

  • SHA1

    53046e27e6dcb59bee387e87a79164be3811ef72

  • SHA256

    f11c02f1cf66f4f3c6527d29c471827d0f6d3982ee1d31c4c7d05c4ff0bc09d4

  • SHA512

    b1beb78d5b42411cd7e7cb406f66e823c8b996e685328fb2155fcfe50f2f6785484df7ef4972bed603ef12e5cbae1949185ce40075aed2ae4d8aae96ec9f0951

  • SSDEEP

    24576:up86EitnYuOILxAlckI4k21w61PFQiIWkaiU4Ru6r+9rPbrdbK2jyIl:IhEEYuO3d1j1PF7IWJ7Q3qNbEIl

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1274462328603148298/RG8TQ5NOTPK7lllW9DXds8Z7Vj68QWZX7Duc-LfDNeqa_HouSEGlNyNzsrVH6EfQxrh8

Targets

    • Target

      d5a18b44a40e9bc1952bce6e187b81926ffd358aa5ebe95921cde2b9a72b172f.exe

    • Size

      1.2MB

    • MD5

      d9ccde3b728fba6d6e3f1b92c75a11a8

    • SHA1

      b0bbe87ae7519b5d6dcd7f6282e891922971942d

    • SHA256

      d5a18b44a40e9bc1952bce6e187b81926ffd358aa5ebe95921cde2b9a72b172f

    • SHA512

      738f1b568009a6df2fcaf2f1c8aba6aee91b4a66474e095d6e483b72ebf1d5309d33908dd1531407a69520b657bdfa75c6b3eda796c20bf1542b632030e58db4

    • SSDEEP

      24576:c1VJqwlZcf4XH1yfEXk3vc8W/jr1STXLmPz63V2HTiViv4qWVLiO6:c1VrlSfI1WlE7/ITq76lslAZxiO6

    • 44Caliber

      An open source infostealer written in C#.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks