Resubmissions

06-04-2023 22:39

230406-2lbe9sfe28 10

31-01-2022 03:40

220131-d79yysfba2 6

General

  • Target

    ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687

  • Size

    390KB

  • Sample

    230406-2lbe9sfe28

  • MD5

    f407b3f68d5603c74c810ba16c08ec9d

  • SHA1

    0f3aac3d2ea898b4722d08dd6fcca0b9a861528b

  • SHA256

    ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687

  • SHA512

    c41ca7fd1e827ba819b77c2349c6fdc621d61437a37193700beb7888e8f51efe9f160fca801fae451c38243c47885864c08896cf93b18986bda9519ad9b9ccf3

  • SSDEEP

    6144:Kj+GKiZ5N2T3dSRcmvmtfYZSAQxGOVP2IkJ8PlMTIwZhYLMBKMYE96B7NtHf798:KVFUrdWcvY8lV+I4gTw3kMBKL26BBtj

Malware Config

Targets

    • Target

      ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687

    • Size

      390KB

    • MD5

      f407b3f68d5603c74c810ba16c08ec9d

    • SHA1

      0f3aac3d2ea898b4722d08dd6fcca0b9a861528b

    • SHA256

      ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687

    • SHA512

      c41ca7fd1e827ba819b77c2349c6fdc621d61437a37193700beb7888e8f51efe9f160fca801fae451c38243c47885864c08896cf93b18986bda9519ad9b9ccf3

    • SSDEEP

      6144:Kj+GKiZ5N2T3dSRcmvmtfYZSAQxGOVP2IkJ8PlMTIwZhYLMBKMYE96B7NtHf798:KVFUrdWcvY8lV+I4gTw3kMBKL26BBtj

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks