General

  • Target

    2fcead4dde3efc15cfa2a1acd887d36535b97eada854a189324dc65013e406b8

  • Size

    1.5MB

  • Sample

    220131-d8gzkafba4

  • MD5

    42b7ad9f68861217fa003d3154c0d779

  • SHA1

    7574bc07cfb34148fca3e18c87c64554a7b8529a

  • SHA256

    2fcead4dde3efc15cfa2a1acd887d36535b97eada854a189324dc65013e406b8

  • SHA512

    d457fd41ebf63fa24959fadd5be4600da790b43025025163d620e662e219086c265545494bc0fd40eb71463e64af0f651f1fe9509a40ce67fac625f98e20cb53

Malware Config

Targets

    • Target

      2fcead4dde3efc15cfa2a1acd887d36535b97eada854a189324dc65013e406b8

    • Size

      1.5MB

    • MD5

      42b7ad9f68861217fa003d3154c0d779

    • SHA1

      7574bc07cfb34148fca3e18c87c64554a7b8529a

    • SHA256

      2fcead4dde3efc15cfa2a1acd887d36535b97eada854a189324dc65013e406b8

    • SHA512

      d457fd41ebf63fa24959fadd5be4600da790b43025025163d620e662e219086c265545494bc0fd40eb71463e64af0f651f1fe9509a40ce67fac625f98e20cb53

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks