General

  • Target

    8308fabcb39d0bc395b524ae6d10a0fe97241bc7abd9d4b9d8d238d6a8c8e2d1

  • Size

    1.9MB

  • Sample

    220208-xg6cmadcaq

  • MD5

    4ea756322ef09d7db74a9b1e4e8e12f9

  • SHA1

    833ee2005a1a4ec7632c95f44db1919e45f46ec2

  • SHA256

    8308fabcb39d0bc395b524ae6d10a0fe97241bc7abd9d4b9d8d238d6a8c8e2d1

  • SHA512

    f569475e6d01cba067281dca0c7c79b7414b981b5c64ad352e9dc865f4efeaa49fe2c723edc6ab68109431bcd3eeaff271de0bf1bd888a053d62c3bd9d31030e

Malware Config

Targets

    • Target

      8308fabcb39d0bc395b524ae6d10a0fe97241bc7abd9d4b9d8d238d6a8c8e2d1

    • Size

      1.9MB

    • MD5

      4ea756322ef09d7db74a9b1e4e8e12f9

    • SHA1

      833ee2005a1a4ec7632c95f44db1919e45f46ec2

    • SHA256

      8308fabcb39d0bc395b524ae6d10a0fe97241bc7abd9d4b9d8d238d6a8c8e2d1

    • SHA512

      f569475e6d01cba067281dca0c7c79b7414b981b5c64ad352e9dc865f4efeaa49fe2c723edc6ab68109431bcd3eeaff271de0bf1bd888a053d62c3bd9d31030e

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Echelon log file

      Detects a log file produced by Echelon.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks