Resubmissions
Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 19:06
Behavioral task
behavioral1
Sample
AstraImageLogger.exe
Resource
win7-20250207-en
General
-
Target
AstraImageLogger.exe
-
Size
275KB
-
MD5
a3696dd072443ecb27c0c7f12a14b61f
-
SHA1
7525f55b0015b8ae66452c3ef143c18325ff9bd0
-
SHA256
8807b5909f1b81254dfd6d62a3c4d590d1330085eaf786f6ff995617f8c5e562
-
SHA512
aaba4ed34e31592ecf3f6c408a89aff88891d6ca9dcd3b8073f84ac6371ef7626e0d6783cf23fcfd7b055944c1a739cc64543986bc4cb4a95ba96def5af8a6ed
-
SSDEEP
6144:zf+BLtABPDwnBoKVjuGHm0uu4zblYeJ7lA1D03v9:AnXjm0uu4/lYeM1De9
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1067305012188958802/Toi3qZ0OM4SmK4Z6bWOUhNfyduj98KvQjF8a_1cAjycHP2nSnt94ILWCXAZ6BeViBqUy
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 2 freegeoip.app -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AstraImageLogger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AstraImageLogger.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 AstraImageLogger.exe 4824 AstraImageLogger.exe 4824 AstraImageLogger.exe 4824 AstraImageLogger.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4824 AstraImageLogger.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56fe82fb9d66e6eb1e3e171b5b1c1dfa0
SHA1f8170b861dcd3aa1188a337f1a7953ec830bc7c4
SHA2569cfd7e84d22ab343bfe25d5c9b67ac5d9201b9050fe32c57be2652f5a80860e6
SHA512743f211b8b1852157a5101e2bfada8dd8c4731fc492b2a4ef06fdbac11959b99461698392878750083e7f681ea5a6c4f5c54ae5b66b99c22c54a37fcb387555a
-
Filesize
207B
MD55184cdbee143cc7e801be4ae1480e023
SHA1510de33a468333da7a37b32ee1adfacf9b4a943f
SHA2564c6fe2b56e7227b92377c434838752cf5021a36c4a897c4a8f3dfe69ba84d2eb
SHA51245f4352decc17fa3ce6d8ae5261abbd3fef90075a5d69d50bb6cef91a87c1abd3ff61a91a92d72168778232687dbc9a6547997e8c42b9b1db590339943859711
-
Filesize
474B
MD5eb9b1018b479b82e3bdb55442e9b7529
SHA1d5ef67e1400ef1bd12400c339a26ac48d6943c2e
SHA256245da53b478eca9d46f3f00e9c573ec33819ac4c97c3600d3cb17adc2d991747
SHA512171c4bebaee8a91b69254fe0499d30046821de331fe177d8f8898668b685a2e265b4b928011c9634e3ae0ac14f5cb64786a242c5d332aa4d8fd51ec46cade1eb
-
Filesize
489B
MD534154d28e7ce47d03e9e648d7dbd8d65
SHA1bbfc36149fc473b73d6cd335215a416071ed2e38
SHA256a2eaa1047f01885fc93f1bc0406dc6942d60d30867f569d8b809378a3716f710
SHA5122eef5ad23f23ed40a50e771fee4350530c41dc0e368f924ab64c5413714c75ee7861cab69c19257bbcc447201e1a877d21574971798b20013afc6554cd1c451b
-
Filesize
781B
MD5dbbc8afe3719cea018614c49d1ff3a55
SHA1c9b395a2bd71a29b50b29e25cb44dcec80e681d8
SHA2566f62fc979d987f547079e3fc68ab1f8f365648e97cef86fe815b1258cc807c16
SHA5123ca6faabd2a0cca1b6916c019a7bf6bd85a30306c247ab09e187e0d317e35b9ebc7ea84331f466c620ca9ade07eaa43ad175d8c4a1baff7cb320207d46ec6431
-
Filesize
1KB
MD5c7a518681f555f7871fcf9522c1c7cfc
SHA1d381a7c0338efb0706f1cf75439d58b643a73ff0
SHA256721b6b6560ead7496ad48639e47d9085ccdc3606b20a1dc5d410656540b7eb7d
SHA512686b4309e8c15590102eb005a4fbbfcf3c48e599f0e164fa3858fd3d49f43c7b6194fb7d67f52d893de25fd73b3328fa6f95c7edb7494b756f0086d430d60c6d