General
-
Target
94e93ada2127d906e40067ec89da68685df86d537878d47415ab8dac1a9a0d32
-
Size
6.0MB
-
Sample
220708-vbjwbsdbd5
-
MD5
56bee069313ec7dbdf30acb7c93ec7a3
-
SHA1
e8728f02760926850ec999b7c268e71fa7913585
-
SHA256
94e93ada2127d906e40067ec89da68685df86d537878d47415ab8dac1a9a0d32
-
SHA512
31091c8e5b6ba413f39693022fabd6d25dda6a6cf3181934b81bbca8c396febc58b503afd52232c50081c6a1828f53d5ed2e07a2b2e9926c8160cd06ff60806e
Static task
static1
Behavioral task
behavioral1
Sample
94e93ada2127d906e40067ec89da68685df86d537878d47415ab8dac1a9a0d32.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
94e93ada2127d906e40067ec89da68685df86d537878d47415ab8dac1a9a0d32.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
94e93ada2127d906e40067ec89da68685df86d537878d47415ab8dac1a9a0d32
-
Size
6.0MB
-
MD5
56bee069313ec7dbdf30acb7c93ec7a3
-
SHA1
e8728f02760926850ec999b7c268e71fa7913585
-
SHA256
94e93ada2127d906e40067ec89da68685df86d537878d47415ab8dac1a9a0d32
-
SHA512
31091c8e5b6ba413f39693022fabd6d25dda6a6cf3181934b81bbca8c396febc58b503afd52232c50081c6a1828f53d5ed2e07a2b2e9926c8160cd06ff60806e
-
Echelon log file
Detects a log file produced by Echelon.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-