C:\Users\elnam\OneDrive\Рабочий стол\44CALIBER-main\44CALIBER\obj\Release\Insidious.pdb
Behavioral task
behavioral1
Sample
3c2167a8185cbc012db49cbdf0edb9bf90e8ffe34453e3d4a42d6419f0d9564f.exe
Resource
win7-20240903-en
General
-
Target
3c2167a8185cbc012db49cbdf0edb9bf90e8ffe34453e3d4a42d6419f0d9564f.exe
-
Size
274KB
-
MD5
9b532ca59da4806a6ad268a6747ea550
-
SHA1
dc29c06573a11d944e96a7376f5032d4d4e31fa6
-
SHA256
3c2167a8185cbc012db49cbdf0edb9bf90e8ffe34453e3d4a42d6419f0d9564f
-
SHA512
57ca728951d38a723bd6059df616304eff16a883c7ba6d8ac9153800ff26d9a3e7b786e3e734a700362a04721065d62b75aaf5f7c3d4379de6b6517e9e6c4cb7
-
SSDEEP
6144:df+BLtABPDLgj1xw1eO5rbMMzhgUsYqTXGR1afTyclI1D02SIS:6161eO5rbHHsYqTXG9R1DUIS
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/1165023408308883527/fHcVLlt-XS3bpeW4Pr9RnfIG-6FlU5L4fEDsBCSSGSwNqbsOngyplRsyoD4tshYENWIO
Signatures
-
44caliber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3c2167a8185cbc012db49cbdf0edb9bf90e8ffe34453e3d4a42d6419f0d9564f.exe
Files
-
3c2167a8185cbc012db49cbdf0edb9bf90e8ffe34453e3d4a42d6419f0d9564f.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ