General

  • Target

    nurik.exe

  • Size

    333KB

  • Sample

    241113-p5386svrel

  • MD5

    f6e15a4eba5f1bcfd4c60ad8c4b2f9b7

  • SHA1

    e929b611283987c4dc213b7ce786bb5762fbcaaf

  • SHA256

    bcd7b068992fb848fc3ba76021b3e095d0a0682c17146b4d836fa2a7846a2e0f

  • SHA512

    474c63a3dc03ddc3baf0463723ac991bd0cec08ebeaa64b867c91ae8624bbe37e1b1011e05f55ed7f1135f96931d654b243e8634d6dc367bd5ced05a6c1d7070

  • SSDEEP

    6144:ChCaXLv7nv96n5wmrHtU0wd9vKPoYYqUOiD:gbnFLUNeYYq7

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1305967301434278000/MpR7whMC0XD8kaQy0et_dS_pJ52JmjXF1npMfUhwPeAHtnIp1OFwqC6MgKNDdiZUkC2k

Targets

    • Target

      nurik.exe

    • Size

      333KB

    • MD5

      f6e15a4eba5f1bcfd4c60ad8c4b2f9b7

    • SHA1

      e929b611283987c4dc213b7ce786bb5762fbcaaf

    • SHA256

      bcd7b068992fb848fc3ba76021b3e095d0a0682c17146b4d836fa2a7846a2e0f

    • SHA512

      474c63a3dc03ddc3baf0463723ac991bd0cec08ebeaa64b867c91ae8624bbe37e1b1011e05f55ed7f1135f96931d654b243e8634d6dc367bd5ced05a6c1d7070

    • SSDEEP

      6144:ChCaXLv7nv96n5wmrHtU0wd9vKPoYYqUOiD:gbnFLUNeYYq7

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • UAC bypass

    • Windows security bypass

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks