General

  • Target

    NewHacks.exe

  • Size

    1.1MB

  • Sample

    210811-razlmdcjw6

  • MD5

    d59bf492da2f21db13264aba7b40f464

  • SHA1

    c69eadf5aa174c34c90445548d5b2d5888957eae

  • SHA256

    4732655de9b6a0497a825ab53ef9e8c3db1a9d1520d1ae505ec2b07df305cef1

  • SHA512

    f781f75e84f88c9aa015644ba5744d5b360951fc753d054f2e999244907baae5a109563c5b4817a2e7ee2f91c2048366552d22364e593503ba8aec05ce4cef59

Malware Config

Targets

    • Target

      NewHacks.exe

    • Size

      1.1MB

    • MD5

      d59bf492da2f21db13264aba7b40f464

    • SHA1

      c69eadf5aa174c34c90445548d5b2d5888957eae

    • SHA256

      4732655de9b6a0497a825ab53ef9e8c3db1a9d1520d1ae505ec2b07df305cef1

    • SHA512

      f781f75e84f88c9aa015644ba5744d5b360951fc753d054f2e999244907baae5a109563c5b4817a2e7ee2f91c2048366552d22364e593503ba8aec05ce4cef59

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks