General
-
Target
Insidious.exe
-
Size
303KB
-
Sample
250410-v7l1kaytfs
-
MD5
c43ddb1e9fd0b8f0c9c641dac61602f1
-
SHA1
b2da3dda97fb4d3244c8c29613b1cd36bec3b694
-
SHA256
8160930de4b082c7f57d69f9d5cbe8f820d9054f20b4b11bacbd318cdd4b6552
-
SHA512
ec26ab1b75a99d5bf05191d74aa688fce7689f4929f1da297693035fdaf4bd74aa43126e70fb93612a5e0c5e720213bf6d8c6d9906ff038827f8283ad3381064
-
SSDEEP
6144:hXt3T6MDdbICydeBimcmXKhJUPawkmA1D04+g:hXttpcmXKnUSJ1DCg
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1359941830325833781/Ee-iVoBJXHU7iXknLWKE1DQbAdhfEQ1EBs0-nU-V0FMyVWSdYMlkvENsrU--COpQB_Al
Targets
-
-
Target
Insidious.exe
-
Size
303KB
-
MD5
c43ddb1e9fd0b8f0c9c641dac61602f1
-
SHA1
b2da3dda97fb4d3244c8c29613b1cd36bec3b694
-
SHA256
8160930de4b082c7f57d69f9d5cbe8f820d9054f20b4b11bacbd318cdd4b6552
-
SHA512
ec26ab1b75a99d5bf05191d74aa688fce7689f4929f1da297693035fdaf4bd74aa43126e70fb93612a5e0c5e720213bf6d8c6d9906ff038827f8283ad3381064
-
SSDEEP
6144:hXt3T6MDdbICydeBimcmXKhJUPawkmA1D04+g:hXttpcmXKnUSJ1DCg
-
44Caliber family
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-