General
-
Target
2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32
-
Size
3.1MB
-
Sample
250604-r3b31szsdw
-
MD5
38f3bb6e183b312a9e867533e084c98c
-
SHA1
1ad12c574855846b383485bc9eb48ca0683ba6b9
-
SHA256
2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32
-
SHA512
d22535b9a017142540b06cc854e673d337b5d31631f339bba1714f94803f6a424e02faa8ed5e5e467b5fff70e279207387800a4c06a70985caf7a3492d568b69
-
SSDEEP
98304:4J4cok8NYvf9rtzi4181g21f9rtziR18Vg2sc2phmrpcs0:4JsLNQfzziFzfzziMr2p0ris0
Static task
static1
Behavioral task
behavioral1
Sample
2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32.exe
Resource
win10v2004-20250502-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1006954410666106990/9Iy2qOgXVC_vEQnjlUpdYRCXfaWC5wOtFa4nGroibeTyQ4j03lDdl1qMLghs02XGK34k
Targets
-
-
Target
2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32
-
Size
3.1MB
-
MD5
38f3bb6e183b312a9e867533e084c98c
-
SHA1
1ad12c574855846b383485bc9eb48ca0683ba6b9
-
SHA256
2b20f8e51a2dd29fa4582750ba22103c28a9f3dc7c0064bbb3a31163ffdf8c32
-
SHA512
d22535b9a017142540b06cc854e673d337b5d31631f339bba1714f94803f6a424e02faa8ed5e5e467b5fff70e279207387800a4c06a70985caf7a3492d568b69
-
SSDEEP
98304:4J4cok8NYvf9rtzi4181g21f9rtziR18Vg2sc2phmrpcs0:4JsLNQfzziFzfzziMr2p0ris0
-
44Caliber family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-