General

  • Target

    bcd93c7eb4909c04cacc58386cf50aec172ffb8f5f7161bcde3a973007b2f754

  • Size

    581KB

  • Sample

    201106-l8p1xqe6wn

  • MD5

    16bf61b209cfed043e348b8d28fabbaf

  • SHA1

    6e8285f96f9056d9483b0e5770644a7d67e90364

  • SHA256

    bcd93c7eb4909c04cacc58386cf50aec172ffb8f5f7161bcde3a973007b2f754

  • SHA512

    80d19eb5931bfeac07cfe330d57bd2be5a123c3beae3524cfb732230fd6919bb94b72a99c49f6318493d985f66f9133e62135108a2fa59f7a118d77906f5c513

Malware Config

Targets

    • Target

      bcd93c7eb4909c04cacc58386cf50aec172ffb8f5f7161bcde3a973007b2f754

    • Size

      581KB

    • MD5

      16bf61b209cfed043e348b8d28fabbaf

    • SHA1

      6e8285f96f9056d9483b0e5770644a7d67e90364

    • SHA256

      bcd93c7eb4909c04cacc58386cf50aec172ffb8f5f7161bcde3a973007b2f754

    • SHA512

      80d19eb5931bfeac07cfe330d57bd2be5a123c3beae3524cfb732230fd6919bb94b72a99c49f6318493d985f66f9133e62135108a2fa59f7a118d77906f5c513

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks