General
-
Target
Insidious.exe
-
Size
303KB
-
Sample
250211-n565dsykht
-
MD5
9aa717cec4e9f75aa00e786eae4a3d04
-
SHA1
ac99a075824a6b085745e302ff48abf368d31d27
-
SHA256
158ec994a6de6b0b7cffcf86c9474f91cacdb6b0ce0e7a070df250870cc0c044
-
SHA512
8d092206c0f3d11e2f5146bbc15488990c2952dbd843188aa91c745b5a513f9ea3d63ced78a113c17544d684031f123ec989034fafd1f70c9f355efc02fccde5
-
SSDEEP
6144:dRlT6MDdbICydeBV9suqPmlF62y6hmA1D0tUt:dRT4uqPmH6Da1D5t
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1338833550199492618/rw2c6QUr58msenoKNKsg8ZLDsVFUzkO7iGhk2kE6ipUW1tOa4RuHOLFqDfRB05yiIfWD
Targets
-
-
Target
Insidious.exe
-
Size
303KB
-
MD5
9aa717cec4e9f75aa00e786eae4a3d04
-
SHA1
ac99a075824a6b085745e302ff48abf368d31d27
-
SHA256
158ec994a6de6b0b7cffcf86c9474f91cacdb6b0ce0e7a070df250870cc0c044
-
SHA512
8d092206c0f3d11e2f5146bbc15488990c2952dbd843188aa91c745b5a513f9ea3d63ced78a113c17544d684031f123ec989034fafd1f70c9f355efc02fccde5
-
SSDEEP
6144:dRlT6MDdbICydeBV9suqPmlF62y6hmA1D0tUt:dRT4uqPmH6Da1D5t
-
44Caliber family
-
Downloads MZ/PE file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2