Resubmissions
Analysis
-
max time kernel
118s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2025, 19:24
Behavioral task
behavioral1
Sample
AstraImageLogger.exe
Resource
win7-20250207-en
General
-
Target
AstraImageLogger.exe
-
Size
275KB
-
MD5
a3696dd072443ecb27c0c7f12a14b61f
-
SHA1
7525f55b0015b8ae66452c3ef143c18325ff9bd0
-
SHA256
8807b5909f1b81254dfd6d62a3c4d590d1330085eaf786f6ff995617f8c5e562
-
SHA512
aaba4ed34e31592ecf3f6c408a89aff88891d6ca9dcd3b8073f84ac6371ef7626e0d6783cf23fcfd7b055944c1a739cc64543986bc4cb4a95ba96def5af8a6ed
-
SSDEEP
6144:zf+BLtABPDwnBoKVjuGHm0uu4zblYeJ7lA1D03v9:AnXjm0uu4/lYeM1De9
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1067305012188958802/Toi3qZ0OM4SmK4Z6bWOUhNfyduj98KvQjF8a_1cAjycHP2nSnt94ILWCXAZ6BeViBqUy
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 freegeoip.app 1 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AstraImageLogger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AstraImageLogger.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2100 AstraImageLogger.exe 2100 AstraImageLogger.exe 2100 AstraImageLogger.exe 2100 AstraImageLogger.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 AstraImageLogger.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412B
MD50bc432962ce6e4aaacaaaa778c3eede2
SHA190bad84b0304cc13482165ffb1ab077617c1e5f1
SHA2562e7f271a4af93954b3e943409702b5c187e6dcaa034180f80f79133feb082184
SHA5122a70d1bb098f5f6332284030b6e287b3fdf6d806b00197dd38c00c07fb7d15ecc52ecdd775f46b5fdd42b8837e15cf5b7e7853bc9b424c61482e684dad14414e
-
Filesize
771B
MD5d98fa29db3278b501042b54661993bd7
SHA1aaebc6ecb16418a442f56a1ceeb522ef266f18de
SHA2567946fb11b8337cffdbdba8bcab8f2882cbf1d5223fc2478ef7c75423012ddd70
SHA5124c3f72f295231dffdb376e2aa86ef97f746acc80507b97f78c8ee20b470a3f07c2be55aea9d8c11446defe4659018b5c4faa71d76a40222428e2dc166cb0a710
-
Filesize
1KB
MD51ba5ef4bf56e9816966f6ed981268c16
SHA1345e4dc5857db071e049fd8260a88a6794e3e021
SHA256d66b3601519a1b5f66849ee9d99ec644b19b65208e1f52af8de361b1357a03b5
SHA512e49b9b037bcc43ad2b379f47b9267011c6417d9b968af7efda95c70081262e755f369283a4d39d20dcf6169147dba982d368ec088272f64af6f119cfaf42015b