General
-
Target
07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.zip
-
Size
1.5MB
-
Sample
250131-s4xa1szlaz
-
MD5
315bb4899e45aaf223f6f9af55d5c9f2
-
SHA1
6cd5e904d8438d44d0bf1b72e60689e17b6c9e73
-
SHA256
da3873948167e651743fac7c1b688c11ec37ef5b1443202aaca23b24a1e73bf9
-
SHA512
c5aa669f9529876bed005d5711b51b714198e44d75f8d6bbae8c16fcecd51fca2d343231c59f33b364667025d52c9336d76595a6ce6036f44fc80626734470d4
-
SSDEEP
24576:7KiTDBpuDLwiXY1e9USkT23/J7PTGeFEEYo23LWr+BEeh1WRrn9g:7Ki/6LwoUSb/NPKeFBYp3LWKJfWRrn9g
Static task
static1
Malware Config
Extracted
44caliber
https://ptb.discord.com/api/webhooks/1191727961125158913/AO3r_s05R0U-6xEmnSGeaNuYUkFwxvk1U1oYOinVZKjPH9PGr5fHvc41o-BfoHkgQRjS
Targets
-
-
Target
07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9.exe
-
Size
1.7MB
-
MD5
8919a3ebfb67cc3d12f475baa82ca476
-
SHA1
0e6aa733c49dc293f2936b32600390cedb0767ae
-
SHA256
07b03eeff0d15ffa67346df3c0d0aceaa18be760811579e274066f3f2c5ec9e9
-
SHA512
eac4ba93e8f84413a4d5a4e590263c493011cdfa2a6b96dee2222930a22c30ef885d4651d0783b10c26b8b75cc1f61c32302671dcf9de9f1a3dd19a29c1d1593
-
SSDEEP
24576:rcbD/3+3Nb8c6xUN8c/CNlSC3Af8XwYJs4nUAo3E5IuquLJlxpCp8zMgNFLtU5Vp:rcbz+3H6NXL3cYi4nUpmIm2BIG5VBj
-
44Caliber family
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2