General
-
Target
ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687
-
Size
390KB
-
Sample
230406-2lbe9sfe28
-
MD5
f407b3f68d5603c74c810ba16c08ec9d
-
SHA1
0f3aac3d2ea898b4722d08dd6fcca0b9a861528b
-
SHA256
ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687
-
SHA512
c41ca7fd1e827ba819b77c2349c6fdc621d61437a37193700beb7888e8f51efe9f160fca801fae451c38243c47885864c08896cf93b18986bda9519ad9b9ccf3
-
SSDEEP
6144:Kj+GKiZ5N2T3dSRcmvmtfYZSAQxGOVP2IkJ8PlMTIwZhYLMBKMYE96B7NtHf798:KVFUrdWcvY8lV+I4gTw3kMBKL26BBtj
Static task
static1
Behavioral task
behavioral1
Sample
ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687
-
Size
390KB
-
MD5
f407b3f68d5603c74c810ba16c08ec9d
-
SHA1
0f3aac3d2ea898b4722d08dd6fcca0b9a861528b
-
SHA256
ea9d870a9260fddc829194c8288fec41075bfa24fd1a0cb2988b538efe329687
-
SHA512
c41ca7fd1e827ba819b77c2349c6fdc621d61437a37193700beb7888e8f51efe9f160fca801fae451c38243c47885864c08896cf93b18986bda9519ad9b9ccf3
-
SSDEEP
6144:Kj+GKiZ5N2T3dSRcmvmtfYZSAQxGOVP2IkJ8PlMTIwZhYLMBKMYE96B7NtHf798:KVFUrdWcvY8lV+I4gTw3kMBKL26BBtj
Score10/10-
Detects Echelon Stealer payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-