General
-
Target
Loader.exe
-
Size
303KB
-
Sample
250210-qzpn9stpfy
-
MD5
06cefa8ca9d8b957ff7862c2bc095532
-
SHA1
00ddd5275d33b114891e8a1304f022cf31a3badc
-
SHA256
d6ff445d907d3cf0ca59cc2fa738de8b83f03c8bcb1420f425adf5b113fbdf38
-
SHA512
5e53b85ac8694cdcfab457a872811a5e42da18ab41de32b12d2ed28c32b9e4090c069833caf6fc9b02f9717314f5647027f85b506bea6ecf6f639d64c8d4aa90
-
SSDEEP
6144:uNFT6MDdbICydeBpxUKCa269TwHfw6fmA1D0H/s:uNzIKCa2yT301DUs
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240903-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1338494455816130602/RfPMucy7qNgnF1KO1MI5iOATLOqPdaYE1pn3HhuPCtXjqRXs3t1NFhCJsYBUYOc2mSD5
Targets
-
-
Target
Loader.exe
-
Size
303KB
-
MD5
06cefa8ca9d8b957ff7862c2bc095532
-
SHA1
00ddd5275d33b114891e8a1304f022cf31a3badc
-
SHA256
d6ff445d907d3cf0ca59cc2fa738de8b83f03c8bcb1420f425adf5b113fbdf38
-
SHA512
5e53b85ac8694cdcfab457a872811a5e42da18ab41de32b12d2ed28c32b9e4090c069833caf6fc9b02f9717314f5647027f85b506bea6ecf6f639d64c8d4aa90
-
SSDEEP
6144:uNFT6MDdbICydeBpxUKCa269TwHfw6fmA1D0H/s:uNzIKCa2yT301DUs
-
44Caliber family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2