General

  • Target

    BootstrapperNew.exe

  • Size

    11.8MB

  • Sample

    250410-nm2f7azvhw

  • MD5

    00bf4984f80c066ce8f4ecaa93c337bb

  • SHA1

    4662aa890e8a64ead9b9f5b5129fae3ca0c5b60e

  • SHA256

    952ad6a684a3c4bbc00494926a933c68707b80ead10eab3f096d252d9d054e9a

  • SHA512

    f716f2675fa5d506e9d220dea8555c9133af43149fdfb484eaa5f1456446aea15faae78e4dd2162a27e7bf22cee95a369a8e299117ebb1d7627a178b0909799e

  • SSDEEP

    196608:WboBI6F8e90gAT7Mad+xxaCSoh3Buv+6tA56+wDHBV7NeHExxX:Wb4P4T7MTxkC1Sv+UA58DHLi

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1324859273448128522/35NX8pTWSAG9BYKMS0plx5Cvuvs_8H5JGZj2A702Gn1FEZ64KTjaAl3gNKdJNc1eYdeY

Targets

    • Target

      BootstrapperNew.exe

    • Size

      11.8MB

    • MD5

      00bf4984f80c066ce8f4ecaa93c337bb

    • SHA1

      4662aa890e8a64ead9b9f5b5129fae3ca0c5b60e

    • SHA256

      952ad6a684a3c4bbc00494926a933c68707b80ead10eab3f096d252d9d054e9a

    • SHA512

      f716f2675fa5d506e9d220dea8555c9133af43149fdfb484eaa5f1456446aea15faae78e4dd2162a27e7bf22cee95a369a8e299117ebb1d7627a178b0909799e

    • SSDEEP

      196608:WboBI6F8e90gAT7Mad+xxaCSoh3Buv+6tA56+wDHBV7NeHExxX:Wb4P4T7MTxkC1Sv+UA58DHLi

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v16

Tasks