General

  • Target

    0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819

  • Size

    4.1MB

  • Sample

    220326-zqnkaahda5

  • MD5

    4db5c29f082e78410b0bb79137651ea4

  • SHA1

    08a2226f1ac939aa8e5d542ef515f845c2a0fe10

  • SHA256

    0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819

  • SHA512

    df92c5d6e2e6b29aec20f7dba871a43dd5c780cf0ecdbcb5c97cbc3f759871bb354eb4ecb39f749d578a2ebd405e3dd43733a9ea83b67157766076a7a2a63f53

Malware Config

Targets

    • Target

      0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819

    • Size

      4.1MB

    • MD5

      4db5c29f082e78410b0bb79137651ea4

    • SHA1

      08a2226f1ac939aa8e5d542ef515f845c2a0fe10

    • SHA256

      0f4dd1c10186f8682986732134e6f33f440fbdd999aff471aa82a782e6886819

    • SHA512

      df92c5d6e2e6b29aec20f7dba871a43dd5c780cf0ecdbcb5c97cbc3f759871bb354eb4ecb39f749d578a2ebd405e3dd43733a9ea83b67157766076a7a2a63f53

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks