C:\Users\Ma3stro\Downloads\44CALIBER-main\44CALIBER\obj\Debug\Insidious.pdb
Behavioral task
behavioral1
Sample
e2780d5f4e1a30a57a4e47f893370e60N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e2780d5f4e1a30a57a4e47f893370e60N.exe
Resource
win10v2004-20240802-en
General
-
Target
e2780d5f4e1a30a57a4e47f893370e60N.exe
-
Size
303KB
-
MD5
e2780d5f4e1a30a57a4e47f893370e60
-
SHA1
f5adbd631b5303cb832eb59085210176dfb0bdb6
-
SHA256
8d14c3ddc1f328f6afa101354b3bd237ea5f6d5ede5526c301d647db5e7b2829
-
SHA512
d9b68d4d01e6fc495afcbf2255f684a609fc96edfdb17cc34bd2b3c27d54374225424a7f16214f38ea44281f0f63c21e46edda89de71aacc72cfb0d8ab6198e1
-
SSDEEP
6144:h/oT6MDdbICydeBrdEGHpcJWbg6vmA1D0q0G:h/WJEGHpQWEM1DWG
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1275104139587616934/cVYjsimoHW_MSjxoI5Prmq28mq3wQZ0Q6S-d_VTdoxMVqXW-c2M0A6ByJLCYIAEg0gsS
Signatures
-
44caliber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e2780d5f4e1a30a57a4e47f893370e60N.exe
Files
-
e2780d5f4e1a30a57a4e47f893370e60N.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 301KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ