General
-
Target
proga.exe
-
Size
1.8MB
-
Sample
250407-x2x7rasls8
-
MD5
37d52955fa43a9b6914f81fac04f0656
-
SHA1
ef005ff7f596ea057022a77f111847ac8b3fb66f
-
SHA256
481e16bd9e829fee9cd41bd992a3287e5882a041b8306029eb7785a66bb4a1ac
-
SHA512
9126bcda7b7ac8b3bc0b9a31981150f8fe59bca93f17b6322d04033ff6567df47d18e2833072c06235502e8a9bf5324967d31bbfd765805dfbc083aeb0d91c24
-
SSDEEP
49152:1Djlabwz9DmRaIKolB7bLpEBm9ggukQ2XC+N7:ZqwRmaQ5k0ukHS+x
Static task
static1
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1356567873270710473/EBvbgkUkr1Nt60uLTvIefHjN4cRMKBHO54aiDqafnZD_q5UFbEfTFkzb_pq5tMMbgSTy
Targets
-
-
Target
proga.exe
-
Size
1.8MB
-
MD5
37d52955fa43a9b6914f81fac04f0656
-
SHA1
ef005ff7f596ea057022a77f111847ac8b3fb66f
-
SHA256
481e16bd9e829fee9cd41bd992a3287e5882a041b8306029eb7785a66bb4a1ac
-
SHA512
9126bcda7b7ac8b3bc0b9a31981150f8fe59bca93f17b6322d04033ff6567df47d18e2833072c06235502e8a9bf5324967d31bbfd765805dfbc083aeb0d91c24
-
SSDEEP
49152:1Djlabwz9DmRaIKolB7bLpEBm9ggukQ2XC+N7:ZqwRmaQ5k0ukHS+x
-
44Caliber family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2