General

  • Target

    f29efd93b6f2e10ac5d2bfa96af4e50fb9c2574acc95efc49ed2f5bbe7a9baa0

  • Size

    526KB

  • Sample

    220512-padd9sgefk

  • MD5

    0fcbaff6f1058bec983c05d703e12fcf

  • SHA1

    a687ad827731392ac25d613fd61538b2622b7f85

  • SHA256

    f29efd93b6f2e10ac5d2bfa96af4e50fb9c2574acc95efc49ed2f5bbe7a9baa0

  • SHA512

    a5d222e68f45eac88df5a677aaabbcc6e682ac73250fcaa32aaf552102c4ce9310ec101078d0ac879f4e6d441cafb2409e18c9af082ebd11fd1023de330d74d2

Malware Config

Targets

    • Target

      f29efd93b6f2e10ac5d2bfa96af4e50fb9c2574acc95efc49ed2f5bbe7a9baa0

    • Size

      526KB

    • MD5

      0fcbaff6f1058bec983c05d703e12fcf

    • SHA1

      a687ad827731392ac25d613fd61538b2622b7f85

    • SHA256

      f29efd93b6f2e10ac5d2bfa96af4e50fb9c2574acc95efc49ed2f5bbe7a9baa0

    • SHA512

      a5d222e68f45eac88df5a677aaabbcc6e682ac73250fcaa32aaf552102c4ce9310ec101078d0ac879f4e6d441cafb2409e18c9af082ebd11fd1023de330d74d2

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks