General

  • Target

    Echelon.exe

  • Size

    582KB

  • Sample

    230224-sraw9ahf6x

  • MD5

    be7fb27a2d8fe2dcb1573590373ccab7

  • SHA1

    1f97541db03a96f28c786e99ee40d8da1a2035fd

  • SHA256

    37b659aa22473d3c2c8d94a2f83735a3e849fa148955401751e9a28963171320

  • SHA512

    209d24bb976d671755bf3cdfffdc9d28d2f7c2fd372d3dd6e1a2fdcb537a50ddfd296a661b3627652d945317b0c211d46b569235897a010bac77aea97de28605

  • SSDEEP

    12288:Ha4ne0dXFMetm3aC33ZLJLUf9snBS4csPYae6qfzFAA:T5I33hhUF54clNf7FB

Malware Config

Targets

    • Target

      Echelon.exe

    • Size

      582KB

    • MD5

      be7fb27a2d8fe2dcb1573590373ccab7

    • SHA1

      1f97541db03a96f28c786e99ee40d8da1a2035fd

    • SHA256

      37b659aa22473d3c2c8d94a2f83735a3e849fa148955401751e9a28963171320

    • SHA512

      209d24bb976d671755bf3cdfffdc9d28d2f7c2fd372d3dd6e1a2fdcb537a50ddfd296a661b3627652d945317b0c211d46b569235897a010bac77aea97de28605

    • SSDEEP

      12288:Ha4ne0dXFMetm3aC33ZLJLUf9snBS4csPYae6qfzFAA:T5I33hhUF54clNf7FB

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks