General

  • Target

    Echelon.exe

  • Size

    592KB

  • Sample

    230628-t4shhabc7s

  • MD5

    42c949896f36865721df77cebebd9705

  • SHA1

    2c9fd967cd744340f133ab997280c62c6d1bd2a2

  • SHA256

    f9f1b8511b6a2f81a35a80fff4880d38fa00c30b10ebb5aecccbfcfb1ff086af

  • SHA512

    f3db8c7c6cd8672c2dd1c5716c75438e5c59706849caaa40453f26bb00da034d4cb44f3e15775679998d575bf15eddcce15c16f405fdc87b568a6705826ada79

  • SSDEEP

    12288:LeI8SoKDZLJLUf9snBS4csPYae6qfzqAA:9oKDhhUF54clNf7qB

Malware Config

Targets

    • Target

      Echelon.exe

    • Size

      592KB

    • MD5

      42c949896f36865721df77cebebd9705

    • SHA1

      2c9fd967cd744340f133ab997280c62c6d1bd2a2

    • SHA256

      f9f1b8511b6a2f81a35a80fff4880d38fa00c30b10ebb5aecccbfcfb1ff086af

    • SHA512

      f3db8c7c6cd8672c2dd1c5716c75438e5c59706849caaa40453f26bb00da034d4cb44f3e15775679998d575bf15eddcce15c16f405fdc87b568a6705826ada79

    • SSDEEP

      12288:LeI8SoKDZLJLUf9snBS4csPYae6qfzqAA:9oKDhhUF54clNf7qB

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks