General
-
Target
Insidious.exe
-
Size
303KB
-
Sample
231224-f5plcagedm
-
MD5
b7324f9ce7df3d5d584beb991d490eb8
-
SHA1
5b431f86a9aa16802ffd0f9efb6a32fd0e78a5dc
-
SHA256
27c3d3834f1941181f3f9d1cd91ab70933b158c5b461962e06b001f95694b091
-
SHA512
c4685172d40008f8d07a0a4ce439e68b921562ae70309a6025430a37b74217bf3624b6ee551bbb86ab0f15a5ad2671bdcd363f0e214c6403f5628ff7745be21a
-
SSDEEP
6144:5LoT6MDdbICydeBHuJvvssWcmNZrWZTPvur5mI1D0IKI:5LWlsWcmbrWZ4j1DkI
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1188061798528716801/D77SxBvLMy5YYF4k7wJBWj7OUZkf938cAWbclFFSX52NRBAyZASKcq_eq9P0X66HWMDI
Targets
-
-
Target
Insidious.exe
-
Size
303KB
-
MD5
b7324f9ce7df3d5d584beb991d490eb8
-
SHA1
5b431f86a9aa16802ffd0f9efb6a32fd0e78a5dc
-
SHA256
27c3d3834f1941181f3f9d1cd91ab70933b158c5b461962e06b001f95694b091
-
SHA512
c4685172d40008f8d07a0a4ce439e68b921562ae70309a6025430a37b74217bf3624b6ee551bbb86ab0f15a5ad2671bdcd363f0e214c6403f5628ff7745be21a
-
SSDEEP
6144:5LoT6MDdbICydeBHuJvvssWcmNZrWZTPvur5mI1D0IKI:5LWlsWcmbrWZ4j1DkI
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-