General

  • Target

    Insidious.exe.vir

  • Size

    274KB

  • Sample

    220617-wkqkxafdc7

  • MD5

    9dff4650d113fe21dcc45c13ef90defd

  • SHA1

    1d45ce5878d6ed0ac9b03588a9aafad752e15db3

  • SHA256

    ba8e080a84946ed54cb2b10247081c845c72f1c9809258a643c6e8aeff0e3d99

  • SHA512

    8b37d92863ed81fd53268800f745766b43e57b502140ad1a394e0be069f3a2631e01947e79712cba3575ee0aa59081bd1461ecfa606aae3e2331706477b02f17

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/987320469264928788/XHGBPVVk0PqB5Bug7qHP2xnrZN4CfIIFQe0thEyFCmF2MEQleEN98ae4oIo8Q6KdiaA_

Targets

    • Target

      Insidious.exe.vir

    • Size

      274KB

    • MD5

      9dff4650d113fe21dcc45c13ef90defd

    • SHA1

      1d45ce5878d6ed0ac9b03588a9aafad752e15db3

    • SHA256

      ba8e080a84946ed54cb2b10247081c845c72f1c9809258a643c6e8aeff0e3d99

    • SHA512

      8b37d92863ed81fd53268800f745766b43e57b502140ad1a394e0be069f3a2631e01947e79712cba3575ee0aa59081bd1461ecfa606aae3e2331706477b02f17

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks