General

  • Target

    ximay.exe

  • Size

    871KB

  • Sample

    210730-b9489lkff2

  • MD5

    f8a4090467dc96146cd516fa96a80171

  • SHA1

    64dd6ec4ff2f57c43903fc8730dd6b0815e914bd

  • SHA256

    3a601391e56cb1ebb50984f2b66b24f10122f66e09e8e21e877596504684a402

  • SHA512

    ea3ad9052ecc0dbdf0dff7636d1bb2586726a0905860d04b58db3a385bf7c9478d9c78cd5d68ee99517bb97220e1f1a53cc07bd949511c8e4dd699cc2a3bb260

Score
10/10

Malware Config

Targets

    • Target

      ximay.exe

    • Size

      871KB

    • MD5

      f8a4090467dc96146cd516fa96a80171

    • SHA1

      64dd6ec4ff2f57c43903fc8730dd6b0815e914bd

    • SHA256

      3a601391e56cb1ebb50984f2b66b24f10122f66e09e8e21e877596504684a402

    • SHA512

      ea3ad9052ecc0dbdf0dff7636d1bb2586726a0905860d04b58db3a385bf7c9478d9c78cd5d68ee99517bb97220e1f1a53cc07bd949511c8e4dd699cc2a3bb260

    Score
    10/10
    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks