General

  • Target

    9faa5628994016d0fac644f5f194f6a9ab40d4693870e097c84acd811518a5da.exe

  • Size

    303KB

  • Sample

    250131-ewdbaayjfz

  • MD5

    94c441fea4c7c290b3c1aedd34c01c49

  • SHA1

    270604ea4f4a625e041bdca2bb71363674640b7b

  • SHA256

    9faa5628994016d0fac644f5f194f6a9ab40d4693870e097c84acd811518a5da

  • SHA512

    834d62f876150c39b347d06633146e8cc61431f1d946e2897052dce85b029907e6421b3e0df979e9ace527741e21bbfcd69ccf5cbb0a191e247ed2e07d609be3

  • SSDEEP

    6144:51E0T6MDdbICydeB1MnyCvGBpmIBW6TmA1D0ADx:51z6yCvGnmIco1Dbx

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1333416198070861874/lkCSbBCw93TgVpHQ0wO0CybItAMXiVCLjpAgz6V_gxra20AWwAZcJ2p8_lKhMMTm1StO

Targets

    • Target

      9faa5628994016d0fac644f5f194f6a9ab40d4693870e097c84acd811518a5da.exe

    • Size

      303KB

    • MD5

      94c441fea4c7c290b3c1aedd34c01c49

    • SHA1

      270604ea4f4a625e041bdca2bb71363674640b7b

    • SHA256

      9faa5628994016d0fac644f5f194f6a9ab40d4693870e097c84acd811518a5da

    • SHA512

      834d62f876150c39b347d06633146e8cc61431f1d946e2897052dce85b029907e6421b3e0df979e9ace527741e21bbfcd69ccf5cbb0a191e247ed2e07d609be3

    • SSDEEP

      6144:51E0T6MDdbICydeB1MnyCvGBpmIBW6TmA1D0ADx:51z6yCvGnmIco1Dbx

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks