D:\Download\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb
General
-
Target
NoteBook Vitax.exe
-
Size
303KB
-
MD5
13de7fe5ae3ca94916e9a2388331ec5b
-
SHA1
e5650b323a754a49a4c44d966513263224af48ce
-
SHA256
8ff779c61ce341d779d71c4d907627b0a0fd33474ac6f5647fcb4484940a810b
-
SHA512
1f7b8946c4d9aed25730dd9952cecb85ea960ca76e39b04d3589f01f44fa522b59af6a26d96821c481b2ce4d96c1f3753835ffdf1a94ec3406444c2331a96563
-
SSDEEP
6144:kr+UT6MDdbICydeBwtgGJSTZsgPvur8mI1D0k2w:krNsgGJSdsrq1Duw
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1192867889502490784/d5b-GoiYJ0-udNuzCNlHbe17U050Uovs3ONP72ifR0EsXXp5DkvWjQWgRI59ylud8K6j
Signatures
-
44caliber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource NoteBook Vitax.exe
Files
-
NoteBook Vitax.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ