General

  • Target

    1e72a9db792b1faa8009ccd252d261de

  • Size

    2.1MB

  • Sample

    250402-cftbfssky9

  • MD5

    1e72a9db792b1faa8009ccd252d261de

  • SHA1

    cd449a868e9e2d5801d385e2c49aa19a67a6fd00

  • SHA256

    dd60d316ef472c3ef62493b316b46255f42730ef2d8f124533e3917027780312

  • SHA512

    400d3f24a941f7848ac80a53d31e29edd5c244779c0571d3a055de8e336dbd46e15a61ffd775487bcca0e03a5407b457e145da2617cd596ebca2401802d5fca1

  • SSDEEP

    24576:xALaiyQh8LwQGTv5fTU5eY3w8hih7ymAyVlpxbiL/90a0OxaHlnJO8gDh5am:xAyI8DGj5Y8n8PkbNXnJqN

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1328443348104515634/LQkwHvZ5wgKz-NuXgc2vsxbqUucIFN9w5eOlOXBKfXJDOLaOJg5AXeztsablYQxwk5D3

Targets

    • Target

      1e72a9db792b1faa8009ccd252d261de

    • Size

      2.1MB

    • MD5

      1e72a9db792b1faa8009ccd252d261de

    • SHA1

      cd449a868e9e2d5801d385e2c49aa19a67a6fd00

    • SHA256

      dd60d316ef472c3ef62493b316b46255f42730ef2d8f124533e3917027780312

    • SHA512

      400d3f24a941f7848ac80a53d31e29edd5c244779c0571d3a055de8e336dbd46e15a61ffd775487bcca0e03a5407b457e145da2617cd596ebca2401802d5fca1

    • SSDEEP

      24576:xALaiyQh8LwQGTv5fTU5eY3w8hih7ymAyVlpxbiL/90a0OxaHlnJO8gDh5am:xAyI8DGj5Y8n8PkbNXnJqN

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks