General

  • Target

    JaffaCakes118_ce6a090b03c500285a62d94abfb8560c

  • Size

    122KB

  • Sample

    250109-wh5l2swnex

  • MD5

    ce6a090b03c500285a62d94abfb8560c

  • SHA1

    86a8b4c7132ab33e2fbe39f72adea570d3d06330

  • SHA256

    d12be37868f64911eddbb4d23645cacd3ae066d1caec75e90a29fb2d71b18027

  • SHA512

    65f61f5caacd162f6b2044c72829566ade18dcafa48a5d4278f904ccc733de37de0f22d2905702fc85571876966b25a2304ea85b4f153d9122e9f1f7bb041964

  • SSDEEP

    3072:HETsDQEIIaPpucm1FF28A/rArPPY36RTGn+v1jmlBjlGe92:HENpBPpuhFYDGhRTrwlv39

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/851690350250164235/Y2YNzVMz_OUKX0s3IL4efOqpvYtOom3DjQN22G8FhBeX0ILVhnIFz50A_KU0LdAeZ1HC

Targets

    • Target

      JaffaCakes118_ce6a090b03c500285a62d94abfb8560c

    • Size

      122KB

    • MD5

      ce6a090b03c500285a62d94abfb8560c

    • SHA1

      86a8b4c7132ab33e2fbe39f72adea570d3d06330

    • SHA256

      d12be37868f64911eddbb4d23645cacd3ae066d1caec75e90a29fb2d71b18027

    • SHA512

      65f61f5caacd162f6b2044c72829566ade18dcafa48a5d4278f904ccc733de37de0f22d2905702fc85571876966b25a2304ea85b4f153d9122e9f1f7bb041964

    • SSDEEP

      3072:HETsDQEIIaPpucm1FF28A/rArPPY36RTGn+v1jmlBjlGe92:HENpBPpuhFYDGhRTrwlv39

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks