General

  • Target

    2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32

  • Size

    3.1MB

  • Sample

    250604-r3b31szsdw

  • MD5

    38f3bb6e183b312a9e867533e084c98c

  • SHA1

    1ad12c574855846b383485bc9eb48ca0683ba6b9

  • SHA256

    2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32

  • SHA512

    d22535b9a017142540b06cc854e673d337b5d31631f339bba1714f94803f6a424e02faa8ed5e5e467b5fff70e279207387800a4c06a70985caf7a3492d568b69

  • SSDEEP

    98304:4J4cok8NYvf9rtzi4181g21f9rtziR18Vg2sc2phmrpcs0:4JsLNQfzziFzfzziMr2p0ris0

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1006954410666106990/9Iy2qOgXVC_vEQnjlUpdYRCXfaWC5wOtFa4nGroibeTyQ4j03lDdl1qMLghs02XGK34k

Targets

    • Target

      2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32

    • Size

      3.1MB

    • MD5

      38f3bb6e183b312a9e867533e084c98c

    • SHA1

      1ad12c574855846b383485bc9eb48ca0683ba6b9

    • SHA256

      2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32

    • SHA512

      d22535b9a017142540b06cc854e673d337b5d31631f339bba1714f94803f6a424e02faa8ed5e5e467b5fff70e279207387800a4c06a70985caf7a3492d568b69

    • SSDEEP

      98304:4J4cok8NYvf9rtzi4181g21f9rtziR18Vg2sc2phmrpcs0:4JsLNQfzziFzfzziMr2p0ris0

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v16

Tasks