Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 14:44
General
-
Target
Insidious.exe
-
Size
303KB
-
MD5
7c71b3abefc0cd9e6852c577e466d905
-
SHA1
1e2777765eb8340b0f9eefaa36b213634806d20c
-
SHA256
686ef70e6f83b17792aac10f5853cd728d1647be6c57cfae1331602df69b211f
-
SHA512
8f3a8f7142a73aacca46b930cf11b21efa0f8433480cb3e95d560a1a96f958413f00a2e8b05d7749656e50c6aa31e6da815434b0f703541821f42529b9a41114
-
SSDEEP
6144:0b4T6MDdbICydeBrdcQG3yf51+/wjmA1D0113:0bGhcQG3yB1aK1DY3
Malware Config
Extracted
Family
44caliber
C2
https://discord.com/api/webhooks/1346493084548075560/YEckkrmFm7scerU_vEBzkRjSlTmaNinaKTCIOFAolLHyb8EgBC4MRQBOOkH10nX3NlHv
Signatures
-
44Caliber family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 freegeoip.app 4 freegeoip.app -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1380 Insidious.exe 1380 Insidious.exe 1380 Insidious.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1380 Insidious.exe