Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2024 21:16
Behavioral task
behavioral1
Sample
dll/BJJ.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dll/BJJ.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dll/ICC.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
dll/ICC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
injector.exe
Resource
win7-20241010-en
General
-
Target
injector.exe
-
Size
303KB
-
MD5
48c85ca1bc5b51b14633d0d01162cba7
-
SHA1
c4c4a8b9df4cf1fd756317760b2ce5206e93fff8
-
SHA256
56e046611b9472a1a69d20580d1e0749b5363c3b3757fe61ff71a94e50d2cd8b
-
SHA512
ba5367c69ebe1732540e037974ef6c7834acc64bd5514d1fa630fce6a96fefd79d7014365bbefb5cc8ddf25891a71c9238c195e8dfc8ef6a81b98bad8a3a0506
-
SSDEEP
6144:whDT6MDdbICydeBb4eKct+ldgk6WSmA1D0Ox6:whZMeKctWdDhk1D/6
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1322256148446838815/YnQHY515s8K_YLOO2IuKm3JUDLvMN7kX8-PDF7seyznEtOJBkt61Btpjet07f3HMDgs6
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 freegeoip.app 1 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3092 injector.exe 3092 injector.exe 3092 injector.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3092 injector.exe