Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 12:40
Behavioral task
behavioral1
Sample
Insidious.exe
Resource
win7-20240903-en
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
76479a85ccdb095400ce6f8e49f6f96c
-
SHA1
dfec26827b24892ba64c748bedfc48b8f83723fa
-
SHA256
077208157453c61a8e0e0595da78aaffac3731f594918cc0b7c2e75016b17812
-
SHA512
b77c51a9e24fc06384ed38dcff109a37e95076ccc80bc7a041e75f400ebca77a3cadab207df1f3048bd28193ed9425e3a4ce347f1da7adb3fb30b2d27f28e41e
-
SSDEEP
6144:Cb4T6MDdbICydeBrdcQG3yf51+/wjmA1D0phr:CbGhcQG3yB1aK1D8r
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1300845993885171797/d6XLWleeGXHsZqUyCp-qA8LBbM-bHv706qhOGiaznpjmNKEE5oNNgdQn4SftKZB758x_
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 freegeoip.app 3 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3960 Insidious.exe 3960 Insidious.exe 3960 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3960 Insidious.exe