General

  • Target

    Insidious (1).exe

  • Size

    303KB

  • Sample

    240515-k2d3naad64

  • MD5

    c2aa5c9d7b5ff911e22255081dcd991c

  • SHA1

    22d2d8232ba5c3aa91ff5afc3592a4714e03249f

  • SHA256

    9e84d874ccf9ab7a3959c442928029571d1382a997ef76afca3ef9a12a16543b

  • SHA512

    141ccd14cd6fbb43219c530fb20f29eca59fdfeea55fe631fae69ded6a662c08f7ea634f779f015780e32412f6a2dd21638ace83529fa41728d501158ad8cd8b

  • SSDEEP

    6144:Wv1T6MDdbICydeBxbf0G3aLpbwsG6bmA1D0Kml:WvD10G3alsNg1Dcl

Malware Config

Extracted

Family

44caliber

C2

https://discordapp.com/api/webhooks/1239267922594103386/cJc3zwAObMx-1WV-HMX9of02O5QVNorkr4T9vAaYBfVmddGmj406b-kTsMGF0n8o8ovf

Targets

    • Target

      Insidious (1).exe

    • Size

      303KB

    • MD5

      c2aa5c9d7b5ff911e22255081dcd991c

    • SHA1

      22d2d8232ba5c3aa91ff5afc3592a4714e03249f

    • SHA256

      9e84d874ccf9ab7a3959c442928029571d1382a997ef76afca3ef9a12a16543b

    • SHA512

      141ccd14cd6fbb43219c530fb20f29eca59fdfeea55fe631fae69ded6a662c08f7ea634f779f015780e32412f6a2dd21638ace83529fa41728d501158ad8cd8b

    • SSDEEP

      6144:Wv1T6MDdbICydeBxbf0G3aLpbwsG6bmA1D0Kml:WvD10G3alsNg1Dcl

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Collection

Data from Local System

2
T1005

Tasks