Analysis
-
max time kernel
34s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 09:02
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
1667298a8a38e435c330d1decf48347a
-
SHA1
8ed1c41d7a9c59a52edc6ad608229fbd7492c763
-
SHA256
f89b8052ec6c4ab10a3332ab50b595cd675dc9043c308e0d37dc48cb6244bf72
-
SHA512
07462881d2d10db571f7e21e6d0cf115a5dbbb88c0afd3a118d88ddae2d9600db9201900866ea9e4adf0eec1f614f2f15ddac6ef69fdc5a3074f9e94eb39b203
-
SSDEEP
6144:zv1T6MDdbICydeBxbf0G3aLpbwsY6jmA1D0KJ6:zvD10G3alsbY1DL6
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1294513700799123476/jcrDYM1wi5rgaYktzvL6L2nE50ZpJ-pdnRrXxz84NCLRYLPfCMN8DTOd97Uc_z3FKP5j
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 freegeoip.app 3 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Insidious.exepid process 1536 Insidious.exe 1536 Insidious.exe 1536 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Insidious.exedescription pid process Token: SeDebugPrivilege 1536 Insidious.exe