General
-
Target
6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca
-
Size
1.3MB
-
Sample
220327-y5xk3aceh5
-
MD5
1ed0417049b2a72cad3d18aa12d544eb
-
SHA1
afa868cdbc6cf10786f886f74b221df2a86f71f4
-
SHA256
6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca
-
SHA512
97c16b84b7f8de0f47072022d35b0ca8b67e69bd047822dcd0fe3e1055572eb118bfea264e9e0334a0db13f491643aa1ae4f11a054e9a21ab74bbe5614254fbb
Static task
static1
Behavioral task
behavioral1
Sample
6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca.exe
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca.exe
Resource
win10v2004-en-20220113
Malware Config
Targets
-
-
Target
6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca
-
Size
1.3MB
-
MD5
1ed0417049b2a72cad3d18aa12d544eb
-
SHA1
afa868cdbc6cf10786f886f74b221df2a86f71f4
-
SHA256
6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca
-
SHA512
97c16b84b7f8de0f47072022d35b0ca8b67e69bd047822dcd0fe3e1055572eb118bfea264e9e0334a0db13f491643aa1ae4f11a054e9a21ab74bbe5614254fbb
Score10/10-
Echelon log file
Detects a log file produced by Echelon.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-