General

  • Target

    Insidious.exe

  • Size

    303KB

  • Sample

    250211-l91r3atnes

  • MD5

    7505682a058f45df956a6cdaa930af95

  • SHA1

    dcf5b4a3de803af8361c85067605bd71d40035ba

  • SHA256

    fe71bbfb6ea7f2373565eaccf6dc11ad16bf1f067da9bd22424e380fc14ff990

  • SHA512

    c4f9b38610ed8a0503d2aa55ce4241537c75ee88b72abda1b3a87c911419c71cbe2a84a203c7624e24a453b1f975937c2360d7136535298499db778402c599d0

  • SSDEEP

    6144:tRlT6MDdbICydeBV9suqPmlF62y6jmA1D0jCc:tRT4uqPmH6DY1DJc

Malware Config

Extracted

Family

44caliber

C2

https://discord.com/api/webhooks/1338073007217840141/eDeh4wwBxq9r_iLg9SoCkKAfiG9U5xZFSL0XqRVIuzLG3ldF3nrWp9gggQzPfh9skV6-

Targets

    • Target

      Insidious.exe

    • Size

      303KB

    • MD5

      7505682a058f45df956a6cdaa930af95

    • SHA1

      dcf5b4a3de803af8361c85067605bd71d40035ba

    • SHA256

      fe71bbfb6ea7f2373565eaccf6dc11ad16bf1f067da9bd22424e380fc14ff990

    • SHA512

      c4f9b38610ed8a0503d2aa55ce4241537c75ee88b72abda1b3a87c911419c71cbe2a84a203c7624e24a453b1f975937c2360d7136535298499db778402c599d0

    • SSDEEP

      6144:tRlT6MDdbICydeBV9suqPmlF62y6jmA1D0jCc:tRT4uqPmH6DY1DJc

    • 44Caliber

      An open source infostealer written in C#.

    • 44Caliber family

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks