General
-
Target
Insidious.exe
-
Size
303KB
-
Sample
250211-l91r3atnes
-
MD5
7505682a058f45df956a6cdaa930af95
-
SHA1
dcf5b4a3de803af8361c85067605bd71d40035ba
-
SHA256
fe71bbfb6ea7f2373565eaccf6dc11ad16bf1f067da9bd22424e380fc14ff990
-
SHA512
c4f9b38610ed8a0503d2aa55ce4241537c75ee88b72abda1b3a87c911419c71cbe2a84a203c7624e24a453b1f975937c2360d7136535298499db778402c599d0
-
SSDEEP
6144:tRlT6MDdbICydeBV9suqPmlF62y6jmA1D0jCc:tRT4uqPmH6DY1DJc
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20240903-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1338073007217840141/eDeh4wwBxq9r_iLg9SoCkKAfiG9U5xZFSL0XqRVIuzLG3ldF3nrWp9gggQzPfh9skV6-
Targets
-
-
Target
Insidious.exe
-
Size
303KB
-
MD5
7505682a058f45df956a6cdaa930af95
-
SHA1
dcf5b4a3de803af8361c85067605bd71d40035ba
-
SHA256
fe71bbfb6ea7f2373565eaccf6dc11ad16bf1f067da9bd22424e380fc14ff990
-
SHA512
c4f9b38610ed8a0503d2aa55ce4241537c75ee88b72abda1b3a87c911419c71cbe2a84a203c7624e24a453b1f975937c2360d7136535298499db778402c599d0
-
SSDEEP
6144:tRlT6MDdbICydeBV9suqPmlF62y6jmA1D0jCc:tRT4uqPmH6DY1DJc
-
44Caliber family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2