General

  • Target

    6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca

  • Size

    1.3MB

  • Sample

    220327-y5xk3aceh5

  • MD5

    1ed0417049b2a72cad3d18aa12d544eb

  • SHA1

    afa868cdbc6cf10786f886f74b221df2a86f71f4

  • SHA256

    6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca

  • SHA512

    97c16b84b7f8de0f47072022d35b0ca8b67e69bd047822dcd0fe3e1055572eb118bfea264e9e0334a0db13f491643aa1ae4f11a054e9a21ab74bbe5614254fbb

Malware Config

Targets

    • Target

      6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca

    • Size

      1.3MB

    • MD5

      1ed0417049b2a72cad3d18aa12d544eb

    • SHA1

      afa868cdbc6cf10786f886f74b221df2a86f71f4

    • SHA256

      6bba6f3268e99406db27258831b7f90dcd67eedfeadf5a9d21f2fa3c64091bca

    • SHA512

      97c16b84b7f8de0f47072022d35b0ca8b67e69bd047822dcd0fe3e1055572eb118bfea264e9e0334a0db13f491643aa1ae4f11a054e9a21ab74bbe5614254fbb

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks