Resubmissions

21-06-2024 12:40

240621-pwm6lazekf 10

21-06-2024 12:37

240621-ptg7kazdlb 10

General

  • Target

    Insidious.exe

  • Size

    303KB

  • Sample

    240621-ptg7kazdlb

  • MD5

    7d9282b8529bbb4ac06a3994fbcd0622

  • SHA1

    d38d467c5e533f3bc247b6ed245fb08412a479d7

  • SHA256

    ca5820bbbcbefd08f5ec820b833b23f7f97556a247da39510a70cbe7b809e3a9

  • SHA512

    aec2d63548176dc1a8ad3d2dfce0bc41973230c6898c55171dec7fc2919b84a8061d4308449c9551cc40ac7c08ad773fd6a7818bbd748ede9be64acc11dcfca5

  • SSDEEP

    6144:jNFT6MDdbICydeBpxUKCa269TwHfg6vmA1D0uAt:jNzIKCa2yTnM1Dmt

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1253689379948593173/lzPh5dDD7ETWYLRPMt2M_Ml82yS42YxolYTwBWldi4NXuLOvpMPhz7AlFtFln1RxcqaC

Targets

    • Target

      Insidious.exe

    • Size

      303KB

    • MD5

      7d9282b8529bbb4ac06a3994fbcd0622

    • SHA1

      d38d467c5e533f3bc247b6ed245fb08412a479d7

    • SHA256

      ca5820bbbcbefd08f5ec820b833b23f7f97556a247da39510a70cbe7b809e3a9

    • SHA512

      aec2d63548176dc1a8ad3d2dfce0bc41973230c6898c55171dec7fc2919b84a8061d4308449c9551cc40ac7c08ad773fd6a7818bbd748ede9be64acc11dcfca5

    • SSDEEP

      6144:jNFT6MDdbICydeBpxUKCa269TwHfg6vmA1D0uAt:jNzIKCa2yTnM1Dmt

    • 44Caliber

      An open source infostealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks