General

  • Target

    631b5eaf7f1cde808364a10d16638ba1fd1f0bcfbfa8100b3c3ded10c11fe7cb

  • Size

    7.4MB

  • Sample

    231114-x2tvbsgg5v

  • MD5

    9fb9fa81c7386f881964404f24375532

  • SHA1

    c1d1786f3020c27f05e2256da2caacf6f28c63f5

  • SHA256

    631b5eaf7f1cde808364a10d16638ba1fd1f0bcfbfa8100b3c3ded10c11fe7cb

  • SHA512

    848a725bb188682f6bb3c464c40da5fc10a92718d4636208c87c719464c1fb24d05a9ec28cb8d0933c8251a2f887097d0c358a26fa41dc624b9909368c4ac366

  • SSDEEP

    196608:8O5f05FNTCfLaGpBMyxmopvou4Pind6M0zV/STY:zsnhIbNkopvou4PIwzV/V

Malware Config

Targets

    • Target

      631b5eaf7f1cde808364a10d16638ba1fd1f0bcfbfa8100b3c3ded10c11fe7cb

    • Size

      7.4MB

    • MD5

      9fb9fa81c7386f881964404f24375532

    • SHA1

      c1d1786f3020c27f05e2256da2caacf6f28c63f5

    • SHA256

      631b5eaf7f1cde808364a10d16638ba1fd1f0bcfbfa8100b3c3ded10c11fe7cb

    • SHA512

      848a725bb188682f6bb3c464c40da5fc10a92718d4636208c87c719464c1fb24d05a9ec28cb8d0933c8251a2f887097d0c358a26fa41dc624b9909368c4ac366

    • SSDEEP

      196608:8O5f05FNTCfLaGpBMyxmopvou4Pind6M0zV/STY:zsnhIbNkopvou4PIwzV/V

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks