General

  • Target

    5af56b2616aa41de5fa1cb8152950a9602ba5b80d9ff07d66b99a58a344ffa47

  • Size

    164KB

  • Sample

    250219-ml2vws1kt3

  • MD5

    b03a9b7dc4cd0cfe945fc858956700a0

  • SHA1

    8a837f43970902b28bbae9ad194b5c2cb2413485

  • SHA256

    5af56b2616aa41de5fa1cb8152950a9602ba5b80d9ff07d66b99a58a344ffa47

  • SHA512

    7f51edddadd8f6c8c3c1f0261ba5022a9daf62dbfe6dd893ddb09834c546889973f64e2842f48f7b15ed769d9d7968dbc2d415f011210e3ed185dedb768918ec

  • SSDEEP

    3072:1r0IgDtgegfU3fwJ59ZhcJgSPUyYcB8kBi2twcm0y/0bX6tBAnAoDZVzACWA/r3Y:JgvC7dcu/yYcikBr+cEoKts5DZeCl/rI

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1338186901810839563/eKerOwDj2c9szzTdBYdfvxKykXdW4D18_ENzXnU3p0yI_WMl5K0D3Sm4qc4WEsKO8eKT

Targets

    • Target

      Задания и ответы ЕГЭ 2025.exe

    • Size

      576KB

    • MD5

      c8e53f9e2b3486e3402cff07b301ad57

    • SHA1

      27bd6460f5eeb7286f54a6dec056b59c34155963

    • SHA256

      80359c5b29862236c579ca430e87a005961cc043e1d331d7d6c0e28b0549f643

    • SHA512

      eb385491d43e3c164fef312a30e304bb10b2073fad6cb60f0e6010464309b4f5850c84ad8a9cd32ce5a93398358ba64074294d6e62412f9ec26b62728c26fa69

    • SSDEEP

      12288:1+OodNa0FcjlUIO/GxJc3RHa2aE+e6Q3fM5pydesxY1IOlT4zrC+WmjMA3w1Oogu:1EdNa

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks