General

  • Target

    be998bee0c372d6f3b93b35ffc71b31f7f708d72ec4999a663162de9d1e23702

  • Size

    2.3MB

  • Sample

    220320-gxw6wshhe5

  • MD5

    33457a5418912781388994b3d6380669

  • SHA1

    afb62f3fa4d7a5f08066e16160b567842e9321f3

  • SHA256

    be998bee0c372d6f3b93b35ffc71b31f7f708d72ec4999a663162de9d1e23702

  • SHA512

    172b1f756c23d9455935f5f1a4e6f060b85485fae6f89a83a077106a5769dc4dbc69c98a119d5e5f9c40c8532dcfda2cafdb70599019bcf1d413d41e853c0844

Malware Config

Targets

    • Target

      be998bee0c372d6f3b93b35ffc71b31f7f708d72ec4999a663162de9d1e23702

    • Size

      2.3MB

    • MD5

      33457a5418912781388994b3d6380669

    • SHA1

      afb62f3fa4d7a5f08066e16160b567842e9321f3

    • SHA256

      be998bee0c372d6f3b93b35ffc71b31f7f708d72ec4999a663162de9d1e23702

    • SHA512

      172b1f756c23d9455935f5f1a4e6f060b85485fae6f89a83a077106a5769dc4dbc69c98a119d5e5f9c40c8532dcfda2cafdb70599019bcf1d413d41e853c0844

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks