General

  • Target

    epsilon.exe

  • Size

    84.1MB

  • Sample

    240428-lw9stada54

  • MD5

    c4817f28a0a7ccf268f05fa31722268e

  • SHA1

    bab181ce1c958f816781a656f65f895f9eb6fca5

  • SHA256

    a54cc3766dc4b1270fb203d8a6fe237952c640c7a116c2bbc948026323d5642b

  • SHA512

    7b027e02cc52a136554e17de5d83a75cf2814134efb9940fbc71baa97676935f3d0c043b1e3c43fb3db46f61762ccd3182c45bfe46adde3832a47ae1a62f3bfa

  • SSDEEP

    1572864:34gPXMoCfeMuVpo4UK7HHeOnSWfNq89JMHRM8awNPET+tbwYuK6a/4mLTBx7:34Ac8Jom7H+OnSWfNq89JMxKwm+tXH/L

Score
7/10

Malware Config

Targets

    • Target

      epsilon.exe

    • Size

      84.1MB

    • MD5

      c4817f28a0a7ccf268f05fa31722268e

    • SHA1

      bab181ce1c958f816781a656f65f895f9eb6fca5

    • SHA256

      a54cc3766dc4b1270fb203d8a6fe237952c640c7a116c2bbc948026323d5642b

    • SHA512

      7b027e02cc52a136554e17de5d83a75cf2814134efb9940fbc71baa97676935f3d0c043b1e3c43fb3db46f61762ccd3182c45bfe46adde3832a47ae1a62f3bfa

    • SSDEEP

      1572864:34gPXMoCfeMuVpo4UK7HHeOnSWfNq89JMHRM8awNPET+tbwYuK6a/4mLTBx7:34Ac8Jom7H+OnSWfNq89JMxKwm+tXH/L

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Target

      LICENSES.chromium.html

    • Size

      8.8MB

    • MD5

      2675b30d524b6c79b6cee41af86fc619

    • SHA1

      407716c1bb83c211bcb51efbbcb6bf2ef1664e5b

    • SHA256

      6a717038f81271f62318212f00b1a2173b9cb0cc435f984710ac8355eb409081

    • SHA512

      3214341da8bf3347a6874535bb0ff8d059ee604e779491780f2b29172f9963e23acbe3c534d888f7a3b99274f46d0628962e1e72a5d3fc6f18ca2b62343df485

    • SSDEEP

      24576:cpD6826x5kSWSsRinoHnmfm646a6N6z68SH4SApTJ:cHSek

    Score
    4/10
    • Target

      resources/elevate.exe

    • Size

      105KB

    • MD5

      792b92c8ad13c46f27c7ced0810694df

    • SHA1

      d8d449b92de20a57df722df46435ba4553ecc802

    • SHA256

      9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37

    • SHA512

      6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

    • SSDEEP

      3072:1bLnrwQoRDtdMMgSXiFJWcIgUVCfRjV/GrWl:1PrwRhte1XsE1l

    Score
    4/10
    • Target

      update.exe

    • Size

      164.7MB

    • MD5

      e797f43c14812e2d2a8635cb208b1b4a

    • SHA1

      e47dfbd6b0c44e8bdc51eb201f6227c5ee9fb22f

    • SHA256

      934d4dbacab813549ae7d96c1278d84c0fdeecf09cd920ff9c24f5074605fc10

    • SHA512

      29398f346a81cca87e3ccf25b8b7bb49a0700d181b4d5643ed3bc017187a3ec86e8942cc8b2090fb6fe86d751c03bc163dae32b904168334ba29c3231bb99c52

    • SSDEEP

      1572864:Dtc2cEGwGrRSREICCr3ka8YrcSAfII01aLadS5sDNd+Ipx9cF3LfxNEK2Ho8jlgY:V+CHrJIgIsV

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

6
T1012

System Information Discovery

9
T1082

Process Discovery

2
T1057

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

2
T1005

Command and Control

Web Service

2
T1102

Tasks