General

  • Target

    Build.exe

  • Size

    3.4MB

  • Sample

    210305-wa3qv16ayn

  • MD5

    74b5bc34a2b3c3dd453560ee4bcb136a

  • SHA1

    c86f8b33e5852b986b41318205e18caf7d0e7f30

  • SHA256

    c3ee35c8830cb3f6083fe15cd7325e14edbf77880b227473b6c3e39999b41493

  • SHA512

    fb68159225c3c518305413ef483765d063be7367f4c43bd08f11ea1d4d50fa1360407050aaf9792788f1391bae1ba389d9ad642a2a2d711af407006e813a9211

Malware Config

Targets

    • Target

      Build.exe

    • Size

      3.4MB

    • MD5

      74b5bc34a2b3c3dd453560ee4bcb136a

    • SHA1

      c86f8b33e5852b986b41318205e18caf7d0e7f30

    • SHA256

      c3ee35c8830cb3f6083fe15cd7325e14edbf77880b227473b6c3e39999b41493

    • SHA512

      fb68159225c3c518305413ef483765d063be7367f4c43bd08f11ea1d4d50fa1360407050aaf9792788f1391bae1ba389d9ad642a2a2d711af407006e813a9211

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • themida

      Detects Themida, Advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks