Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 02:23
Behavioral task
behavioral1
Sample
2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe
Resource
win7-20240903-en
General
-
Target
2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe
-
Size
303KB
-
MD5
568d4673286ea9b9c70d7a68351f5071
-
SHA1
bc45b7861276839bd565daa9c370722ddaee8969
-
SHA256
2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808
-
SHA512
8d9eb7572c71bda79111b59bdd0e0fc4cec38d3bc591471269a2bf0655b13e82483d68b9fe4ff357176a36b27d7ae48361d052c0c8122e4572bef318b5acb0e1
-
SSDEEP
6144:Y5hxT6MDdbICydeBvQ26i2dVTZy6TmA1D0y6z:Y5dY26i2vT4o1DQz
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1215365574050320435/Xs0uw6QCOgwmHxgulV8bRwClRHSPZDdcc_n9uVnaO_5U4aAeOP21GI-qx7kxwlSROYeG
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 freegeoip.app 3 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3252 2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe 3252 2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe 3252 2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe 3252 2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3252 2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe"C:\Users\Admin\AppData\Local\Temp\2fe37b360b2266297431b3ca5857efd07ffdfe88630f402a75cf3c3252e03808.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3252
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
732B
MD5e091867a8e76ede2170deef1d8176678
SHA16e02cae3bda771197e5ae987f457bbb288e2b1f5
SHA2561106a6acf50ad04d945148b718b0d29691f51e739f2fce73d0404c35a4bcb229
SHA5126d45b411193f5367f8ff6a7c16852267ffcdc28b3c2a7a9ca942ff419dc6ae5751f2e30a450e05012460b42b2ea7be835b6806904bee61b004385e9e1abbe75d