General

  • Target

    14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097

  • Size

    4.1MB

  • Sample

    220309-czcstacdh4

  • MD5

    fe7cd92b40ea9ebf51959a1b919a20d7

  • SHA1

    73bfb575f745c52915fe31fb2e6a2232d5552bdd

  • SHA256

    14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097

  • SHA512

    2dc856319e9b716e7dbe96051b19128d478ae333411e0d68c13400d02aef69e63006dcfc5640716f9f3a35310184b8a53ef451af411c9f7a9c168bad17d4a9f0

Malware Config

Targets

    • Target

      14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097

    • Size

      4.1MB

    • MD5

      fe7cd92b40ea9ebf51959a1b919a20d7

    • SHA1

      73bfb575f745c52915fe31fb2e6a2232d5552bdd

    • SHA256

      14e6a9a5cdf93f21bf9a399a2578646628283e18203db77f1683415a690bf097

    • SHA512

      2dc856319e9b716e7dbe96051b19128d478ae333411e0d68c13400d02aef69e63006dcfc5640716f9f3a35310184b8a53ef451af411c9f7a9c168bad17d4a9f0

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks