General

  • Target

    Lucky_Execute.bin

  • Size

    1.0MB

  • Sample

    210408-tmez342q6j

  • MD5

    0a8d7545824b45b1b49fe4edabfa7ed4

  • SHA1

    aa2bdeca74c0a49a3c7305cfd477e6ef1317b7a2

  • SHA256

    5846a8f96c27b089cbb3cba02aeb3b60a8b4fb0a9083b1414474e86ca92c79d0

  • SHA512

    81b2b00883270bdae2c75c999b3b98bef9325c5af3ecd7afa0dcbecd4220531046a464713d9b75b54c8e960ada2167191477541724b548289fec1bb42087c669

Score
10/10

Malware Config

Targets

    • Target

      Lucky_Execute.bin

    • Size

      1.0MB

    • MD5

      0a8d7545824b45b1b49fe4edabfa7ed4

    • SHA1

      aa2bdeca74c0a49a3c7305cfd477e6ef1317b7a2

    • SHA256

      5846a8f96c27b089cbb3cba02aeb3b60a8b4fb0a9083b1414474e86ca92c79d0

    • SHA512

      81b2b00883270bdae2c75c999b3b98bef9325c5af3ecd7afa0dcbecd4220531046a464713d9b75b54c8e960ada2167191477541724b548289fec1bb42087c669

    Score
    10/10
    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks