General
-
Target
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a
-
Size
522KB
-
Sample
220511-c74lhagfdr
-
MD5
1eaced72fb7d641ae89622e325b00226
-
SHA1
3bf9aae121eb77ffc00e69d0331a100604bf13e8
-
SHA256
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a
-
SHA512
a89770a240ffa337d54182018b161055f09f499d5bd9edab9a265bc8a34183d24e2ba21d866edf6055e23070071ba64dcb948580dad652b268187030b630b88e
Static task
static1
Behavioral task
behavioral1
Sample
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a
-
Size
522KB
-
MD5
1eaced72fb7d641ae89622e325b00226
-
SHA1
3bf9aae121eb77ffc00e69d0331a100604bf13e8
-
SHA256
8f3ff63e2c029c663223ac1edb0fa1fc049bd084a36224eda2d89e842769561a
-
SHA512
a89770a240ffa337d54182018b161055f09f499d5bd9edab9a265bc8a34183d24e2ba21d866edf6055e23070071ba64dcb948580dad652b268187030b630b88e
Score10/10-
Echelon log file
Detects a log file produced by Echelon.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-