General
-
Target
423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a
-
Size
4.3MB
-
Sample
231218-ccdftsaab3
-
MD5
eea9f6b6d6e5a3b42567b41468318510
-
SHA1
fdcc3363c7e3c50ae18ff3daa8fea0be707f0542
-
SHA256
423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a
-
SHA512
b11824772d183cd829ef4177d7932062e15a1db9f64ce60b63aacee18187c0148a1b7ff3badf335efcb955d254719426e427cfe4ce4ed3448f4314fbc7553518
-
SSDEEP
98304:j9ZY7XPEKa3Ob0B/9GNwC8JXB6FWsO9SD0agC4aLF:mX51bU99htV9SDA0LF
Behavioral task
behavioral1
Sample
423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a
-
Size
4.3MB
-
MD5
eea9f6b6d6e5a3b42567b41468318510
-
SHA1
fdcc3363c7e3c50ae18ff3daa8fea0be707f0542
-
SHA256
423302423f88c1ed6e85a061e33376e395303f81a8e6ffa06024343e6270144a
-
SHA512
b11824772d183cd829ef4177d7932062e15a1db9f64ce60b63aacee18187c0148a1b7ff3badf335efcb955d254719426e427cfe4ce4ed3448f4314fbc7553518
-
SSDEEP
98304:j9ZY7XPEKa3Ob0B/9GNwC8JXB6FWsO9SD0agC4aLF:mX51bU99htV9SDA0LF
-
Detects Echelon Stealer payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-