General

  • Target

    423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a

  • Size

    4.3MB

  • Sample

    231218-ccdftsaab3

  • MD5

    eea9f6b6d6e5a3b42567b41468318510

  • SHA1

    fdcc3363c7e3c50ae18ff3daa8fea0be707f0542

  • SHA256

    423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a

  • SHA512

    b11824772d183cd829ef4177d7932062e15a1db9f64ce60b63aacee18187c0148a1b7ff3badf335efcb955d254719426e427cfe4ce4ed3448f4314fbc7553518

  • SSDEEP

    98304:j9ZY7XPEKa3Ob0B/9GNwC8JXB6FWsO9SD0agC4aLF:mX51bU99htV9SDA0LF

Malware Config

Targets

    • Target

      423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a

    • Size

      4.3MB

    • MD5

      eea9f6b6d6e5a3b42567b41468318510

    • SHA1

      fdcc3363c7e3c50ae18ff3daa8fea0be707f0542

    • SHA256

      423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a

    • SHA512

      b11824772d183cd829ef4177d7932062e15a1db9f64ce60b63aacee18187c0148a1b7ff3badf335efcb955d254719426e427cfe4ce4ed3448f4314fbc7553518

    • SSDEEP

      98304:j9ZY7XPEKa3Ob0B/9GNwC8JXB6FWsO9SD0agC4aLF:mX51bU99htV9SDA0LF

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks