Resubmissions

Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-02-2025 19:06

General

  • Target

    AstraImageLogger.exe

  • Size

    275KB

  • MD5

    a3696dd072443ecb27c0c7f12a14b61f

  • SHA1

    7525f55b0015b8ae66452c3ef143c18325ff9bd0

  • SHA256

    8807b5909f1b81254dfd6d62a3c4d590d1330085eaf786f6ff995617f8c5e562

  • SHA512

    aaba4ed34e31592ecf3f6c408a89aff88891d6ca9dcd3b8073f84ac6371ef7626e0d6783cf23fcfd7b055944c1a739cc64543986bc4cb4a95ba96def5af8a6ed

  • SSDEEP

    6144:zf+BLtABPDwnBoKVjuGHm0uu4zblYeJ7lA1D03v9:AnXjm0uu4/lYeM1De9

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1067305012188958802/Toi3qZ0OM4SmK4Z6bWOUhNfyduj98KvQjF8a_1cAjycHP2nSnt94ILWCXAZ6BeViBqUy

Signatures

  • 44Caliber

    An open source infostealer written in C#.

  • 44Caliber family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AstraImageLogger.exe
    "C:\Users\Admin\AppData\Local\Temp\AstraImageLogger.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\44\Process.txt

    Filesize

    1KB

    MD5

    6fe82fb9d66e6eb1e3e171b5b1c1dfa0

    SHA1

    f8170b861dcd3aa1188a337f1a7953ec830bc7c4

    SHA256

    9cfd7e84d22ab343bfe25d5c9b67ac5d9201b9050fe32c57be2652f5a80860e6

    SHA512

    743f211b8b1852157a5101e2bfada8dd8c4731fc492b2a4ef06fdbac11959b99461698392878750083e7f681ea5a6c4f5c54ae5b66b99c22c54a37fcb387555a

  • C:\ProgramData\44\Process.txt

    Filesize

    207B

    MD5

    5184cdbee143cc7e801be4ae1480e023

    SHA1

    510de33a468333da7a37b32ee1adfacf9b4a943f

    SHA256

    4c6fe2b56e7227b92377c434838752cf5021a36c4a897c4a8f3dfe69ba84d2eb

    SHA512

    45f4352decc17fa3ce6d8ae5261abbd3fef90075a5d69d50bb6cef91a87c1abd3ff61a91a92d72168778232687dbc9a6547997e8c42b9b1db590339943859711

  • C:\ProgramData\44\Process.txt

    Filesize

    474B

    MD5

    eb9b1018b479b82e3bdb55442e9b7529

    SHA1

    d5ef67e1400ef1bd12400c339a26ac48d6943c2e

    SHA256

    245da53b478eca9d46f3f00e9c573ec33819ac4c97c3600d3cb17adc2d991747

    SHA512

    171c4bebaee8a91b69254fe0499d30046821de331fe177d8f8898668b685a2e265b4b928011c9634e3ae0ac14f5cb64786a242c5d332aa4d8fd51ec46cade1eb

  • C:\ProgramData\44\Process.txt

    Filesize

    489B

    MD5

    34154d28e7ce47d03e9e648d7dbd8d65

    SHA1

    bbfc36149fc473b73d6cd335215a416071ed2e38

    SHA256

    a2eaa1047f01885fc93f1bc0406dc6942d60d30867f569d8b809378a3716f710

    SHA512

    2eef5ad23f23ed40a50e771fee4350530c41dc0e368f924ab64c5413714c75ee7861cab69c19257bbcc447201e1a877d21574971798b20013afc6554cd1c451b

  • C:\ProgramData\44\Process.txt

    Filesize

    781B

    MD5

    dbbc8afe3719cea018614c49d1ff3a55

    SHA1

    c9b395a2bd71a29b50b29e25cb44dcec80e681d8

    SHA256

    6f62fc979d987f547079e3fc68ab1f8f365648e97cef86fe815b1258cc807c16

    SHA512

    3ca6faabd2a0cca1b6916c019a7bf6bd85a30306c247ab09e187e0d317e35b9ebc7ea84331f466c620ca9ade07eaa43ad175d8c4a1baff7cb320207d46ec6431

  • C:\ProgramData\44\Process.txt

    Filesize

    1KB

    MD5

    c7a518681f555f7871fcf9522c1c7cfc

    SHA1

    d381a7c0338efb0706f1cf75439d58b643a73ff0

    SHA256

    721b6b6560ead7496ad48639e47d9085ccdc3606b20a1dc5d410656540b7eb7d

    SHA512

    686b4309e8c15590102eb005a4fbbfcf3c48e599f0e164fa3858fd3d49f43c7b6194fb7d67f52d893de25fd73b3328fa6f95c7edb7494b756f0086d430d60c6d

  • memory/4824-0-0x00007FF8589A3000-0x00007FF8589A5000-memory.dmp

    Filesize

    8KB

  • memory/4824-1-0x0000022FB1CF0000-0x0000022FB1D3C000-memory.dmp

    Filesize

    304KB

  • memory/4824-32-0x00007FF8589A0000-0x00007FF859461000-memory.dmp

    Filesize

    10.8MB

  • memory/4824-120-0x0000022FCC4F0000-0x0000022FCC699000-memory.dmp

    Filesize

    1.7MB

  • memory/4824-121-0x00007FF8589A0000-0x00007FF859461000-memory.dmp

    Filesize

    10.8MB