Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
24-12-2023 05:27
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
b7324f9ce7df3d5d584beb991d490eb8
-
SHA1
5b431f86a9aa16802ffd0f9efb6a32fd0e78a5dc
-
SHA256
27c3d3834f1941181f3f9d1cd91ab70933b158c5b461962e06b001f95694b091
-
SHA512
c4685172d40008f8d07a0a4ce439e68b921562ae70309a6025430a37b74217bf3624b6ee551bbb86ab0f15a5ad2671bdcd363f0e214c6403f5628ff7745be21a
-
SSDEEP
6144:5LoT6MDdbICydeBHuJvvssWcmNZrWZTPvur5mI1D0IKI:5LWlsWcmbrWZ4j1DkI
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1188061798528716801/D77SxBvLMy5YYF4k7wJBWj7OUZkf938cAWbclFFSX52NRBAyZASKcq_eq9P0X66HWMDI
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Insidious.exepid process 4064 Insidious.exe 4064 Insidious.exe 4064 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Insidious.exedescription pid process Token: SeDebugPrivilege 4064 Insidious.exe