General

  • Target

    0a63a636528473bd9ae6170a601ebf535de5eb0d4700dd653345bad8833c4bc9

  • Size

    1.3MB

  • Sample

    220315-t4exeabgfq

  • MD5

    9706ff18ad84be5c698f4ab7a8281bff

  • SHA1

    4185e6bc2543925d96babb928a15f8dfd84027d8

  • SHA256

    0a63a636528473bd9ae6170a601ebf535de5eb0d4700dd653345bad8833c4bc9

  • SHA512

    fef75d0c0852e5ae5f8160f711b0c0d7d2c45529fbb863be9d3aee429e8f736477d353f7ae1541101e125658c2a9534596bfbef8e917a6a438df61ae98d1d711

Malware Config

Targets

    • Target

      0a63a636528473bd9ae6170a601ebf535de5eb0d4700dd653345bad8833c4bc9

    • Size

      1.3MB

    • MD5

      9706ff18ad84be5c698f4ab7a8281bff

    • SHA1

      4185e6bc2543925d96babb928a15f8dfd84027d8

    • SHA256

      0a63a636528473bd9ae6170a601ebf535de5eb0d4700dd653345bad8833c4bc9

    • SHA512

      fef75d0c0852e5ae5f8160f711b0c0d7d2c45529fbb863be9d3aee429e8f736477d353f7ae1541101e125658c2a9534596bfbef8e917a6a438df61ae98d1d711

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks