General

  • Target

    Insidious.exe

  • Size

    275KB

  • Sample

    230118-ymhzysge58

  • MD5

    7d87165c3a5c1985f306f5d0ed1d9e81

  • SHA1

    04b2dd39db67c0b6c2b876c93ddbba00fb98d448

  • SHA256

    5202a078b8140dcdee1252affb3011ea07dc5545f3c47fc4ea65545e4701e7bd

  • SHA512

    ad803c4454715fcbfd6ac894010f607af7894dce38d2800fa8c69c9a0b4fc61601a60a8564065298a74fc93a732314cdacd12b2668b5861bd9856e413b2fbfa8

  • SSDEEP

    6144:8f+BLtABPDdtkQKhzoPrH01kdPF41V6GIeyBiRA1D0FcE:CtkoPj01oY69eyBH1DFE

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1065354220359913512/Pys3daas1BA3mMnC78xAMBPHAX9j0vr2z02qX-TBFsJ7NrEwvGO3zrMc5T_i0UCkjNUs

Targets

    • Target

      Insidious.exe

    • Size

      275KB

    • MD5

      7d87165c3a5c1985f306f5d0ed1d9e81

    • SHA1

      04b2dd39db67c0b6c2b876c93ddbba00fb98d448

    • SHA256

      5202a078b8140dcdee1252affb3011ea07dc5545f3c47fc4ea65545e4701e7bd

    • SHA512

      ad803c4454715fcbfd6ac894010f607af7894dce38d2800fa8c69c9a0b4fc61601a60a8564065298a74fc93a732314cdacd12b2668b5861bd9856e413b2fbfa8

    • SSDEEP

      6144:8f+BLtABPDdtkQKhzoPrH01kdPF41V6GIeyBiRA1D0FcE:CtkoPj01oY69eyBH1DFE

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks