General
-
Target
baf63544b018ab9aa6640ebe48422f77fd81a61ad6ca8d5aeb9cfbe63f01a9c4
-
Size
4.1MB
-
Sample
220306-12a9rshchm
-
MD5
7a7da0b227e440ed8ed25dd058976f44
-
SHA1
c8ed414480d675be16dbfcce03f14db25330dc4f
-
SHA256
baf63544b018ab9aa6640ebe48422f77fd81a61ad6ca8d5aeb9cfbe63f01a9c4
-
SHA512
3cd8497e3d74bd9f94c25f088ed22a427c38b3e5cec5e51a3e49862b6ed4b3ac41ca11a1e0b0bb9923af68b7ee8585b2b09defc795c6c74cd35ac0b1afe820e3
Static task
static1
Behavioral task
behavioral1
Sample
baf63544b018ab9aa6640ebe48422f77fd81a61ad6ca8d5aeb9cfbe63f01a9c4.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
baf63544b018ab9aa6640ebe48422f77fd81a61ad6ca8d5aeb9cfbe63f01a9c4.exe
Resource
win10v2004-en-20220112
Malware Config
Targets
-
-
Target
baf63544b018ab9aa6640ebe48422f77fd81a61ad6ca8d5aeb9cfbe63f01a9c4
-
Size
4.1MB
-
MD5
7a7da0b227e440ed8ed25dd058976f44
-
SHA1
c8ed414480d675be16dbfcce03f14db25330dc4f
-
SHA256
baf63544b018ab9aa6640ebe48422f77fd81a61ad6ca8d5aeb9cfbe63f01a9c4
-
SHA512
3cd8497e3d74bd9f94c25f088ed22a427c38b3e5cec5e51a3e49862b6ed4b3ac41ca11a1e0b0bb9923af68b7ee8585b2b09defc795c6c74cd35ac0b1afe820e3
-
Echelon log file
Detects a log file produced by Echelon.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-