General

  • Target

    70eb349c7806b23eaa21695223c67c013b85da0d20c57c476822518ba8c7aa44

  • Size

    6.1MB

  • Sample

    220708-wms4tafha5

  • MD5

    1f3198dfa1b72086ee1c49a469769c37

  • SHA1

    f98f1127388bf739996d2627efb3aac474d5ad42

  • SHA256

    70eb349c7806b23eaa21695223c67c013b85da0d20c57c476822518ba8c7aa44

  • SHA512

    9d7ecc95d774075449cdd8986a392f61ddecba97769d736b0200ac811155f37efa4ee2388ea8232e7d505f6b0c1f3c2d5b9d165ab965cf3411d905c52a9243a2

Malware Config

Targets

    • Target

      70eb349c7806b23eaa21695223c67c013b85da0d20c57c476822518ba8c7aa44

    • Size

      6.1MB

    • MD5

      1f3198dfa1b72086ee1c49a469769c37

    • SHA1

      f98f1127388bf739996d2627efb3aac474d5ad42

    • SHA256

      70eb349c7806b23eaa21695223c67c013b85da0d20c57c476822518ba8c7aa44

    • SHA512

      9d7ecc95d774075449cdd8986a392f61ddecba97769d736b0200ac811155f37efa4ee2388ea8232e7d505f6b0c1f3c2d5b9d165ab965cf3411d905c52a9243a2

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon log file

      Detects a log file produced by Echelon.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks