General

  • Target

    07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.zip

  • Size

    1.5MB

  • Sample

    250131-s4xa1szlaz

  • MD5

    315bb4899e45aaf223f6f9af55d5c9f2

  • SHA1

    6cd5e904d8438d44d0bf1b72e60689e17b6c9e73

  • SHA256

    da3873948167e651743fac7c1b688c11ec37ef5b1443202aaca23b24a1e73bf9

  • SHA512

    c5aa669f9529876bed005d5711b51b714198e44d75f8d6bbae8c16fcecd51fca2d343231c59f33b364667025d52c9336d76595a6ce6036f44fc80626734470d4

  • SSDEEP

    24576:7KiTDBpuDLwiXY1e9USkT23/J7PTGeFEEYo23LWr+BEeh1WRrn9g:7Ki/6LwoUSb/NPKeFBYp3LWKJfWRrn9g

Malware Config

Extracted

Family

44caliber

C2

https://ptb.discord.com/api/webhooks/1191727961125158913/AO3r_s05R0U-6xEmnSGeaNuYUkFwxvk1U1oYOinVZKjPH9PGr5fHvc41o-BfoHkgQRjS

Targets

    • Target

      07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe

    • Size

      1.7MB

    • MD5

      8919a3ebfb67cc3d12f475baa82ca476

    • SHA1

      0e6aa733c49dc293f2936b32600390cedb0767ae

    • SHA256

      07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9

    • SHA512

      eac4ba93e8f84413a4d5a4e590263c493011cdfa2a6b96dee2222930a22c30ef885d4651d0783b10c26b8b75cc1f61c32302671dcf9de9f1a3dd19a29c1d1593

    • SSDEEP

      24576:rcbD/3+3Nb8c6xUN8c/CNlSC3Af8XwYJs4nUAo3E5IuquLJlxpCp8zMgNFLtU5Vp:rcbz+3H6NXL3cYi4nUpmIm2BIG5VBj

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks