Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-01-2025 18:58
Behavioral task
behavioral1
Sample
FatalityCrack.exe
Resource
win7-20241010-en
windows7-x64
7 signatures
150 seconds
General
-
Target
FatalityCrack.exe
-
Size
303KB
-
MD5
94c441fea4c7c290b3c1aedd34c01c49
-
SHA1
270604ea4f4a625e041bdca2bb71363674640b7b
-
SHA256
9faa5628994016d0fac644f5f194f6a9ab40d4693870e097c84acd811518a5da
-
SHA512
834d62f876150c39b347d06633146e8cc61431f1d946e2897052dce85b029907e6421b3e0df979e9ace527741e21bbfcd69ccf5cbb0a191e247ed2e07d609be3
-
SSDEEP
6144:51E0T6MDdbICydeB1MnyCvGBpmIBW6TmA1D0ADx:51z6yCvGnmIco1Dbx
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1333416198070861874/lkCSbBCw93TgVpHQ0wO0CybItAMXiVCLjpAgz6V_gxra20AWwAZcJ2p8_lKhMMTm1StO
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3056 FatalityCrack.exe 3056 FatalityCrack.exe 3056 FatalityCrack.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3056 FatalityCrack.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2720 3056 FatalityCrack.exe 30 PID 3056 wrote to memory of 2720 3056 FatalityCrack.exe 30 PID 3056 wrote to memory of 2720 3056 FatalityCrack.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\FatalityCrack.exe"C:\Users\Admin\AppData\Local\Temp\FatalityCrack.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3056 -s 10402⤵PID:2720
-