Malware Analysis Report

2024-11-13 14:25

Sample ID 210822-5318pjyd9a
Target Lucky Fixed.exe
SHA256 3ef80a7a371def66b2811ae322f516c62d6a0f1d534a08967f577dc13390408c
Tags
echelon spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

3ef80a7a371def66b2811ae322f516c62d6a0f1d534a08967f577dc13390408c

Threat Level: Known bad

The file Lucky Fixed.exe was found to be: Known bad.

Malicious Activity Summary

echelon spyware stealer

Echelon

Reads user/profile data of web browsers

Looks up external IP address via web service

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2021-08-22 15:37

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-08-22 15:37

Reported

2021-08-22 15:39

Platform

win10v20210408

Max time kernel

40s

Max time network

60s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Lucky Fixed.exe"

Signatures

Echelon

stealer spyware echelon

Reads user/profile data of web browsers

spyware stealer

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A
N/A ip-api.com N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Lucky Fixed.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Lucky Fixed.exe

"C:\Users\Admin\AppData\Local\Temp\Lucky Fixed.exe"

Network

Country Destination Domain Proto
N/A 8.8.8.8:53 api.ipify.org udp
N/A 54.235.188.103:443 api.ipify.org tcp
N/A 8.8.8.8:53 ip-api.com udp
N/A 208.95.112.1:80 ip-api.com tcp
N/A 8.8.8.8:53 api.telegram.org udp
N/A 149.154.167.220:443 api.telegram.org tcp

Files

memory/416-114-0x0000000000E20000-0x0000000000E21000-memory.dmp

memory/416-116-0x0000000003130000-0x00000000031A1000-memory.dmp

memory/416-117-0x000000001BDA0000-0x000000001BDA2000-memory.dmp