General
-
Target
c2728a9030fc90844defcbd8c155fd1c
-
Size
581KB
-
Sample
231222-rsqhnacgf6
-
MD5
c2728a9030fc90844defcbd8c155fd1c
-
SHA1
49f18f9f3512f521aa06055807c0e720ae319233
-
SHA256
4e9e39595b36eda5ad4181e324560a423cd7119b8b666861d98181399df02989
-
SHA512
008f5c255b4cc1d291a92edba8e6cf79cbbe02ccb339ccbb10a96da24906d7f2bd5cb8567fd610fd0c5882156c75786567fb52a88cf7959c44ee4dc03de789f4
-
SSDEEP
12288:IibOqGDZLJLUf9snBS4csPYae6qfz0AA:FOFDhhUF54clNf70B
Behavioral task
behavioral1
Sample
c2728a9030fc90844defcbd8c155fd1c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c2728a9030fc90844defcbd8c155fd1c.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
c2728a9030fc90844defcbd8c155fd1c
-
Size
581KB
-
MD5
c2728a9030fc90844defcbd8c155fd1c
-
SHA1
49f18f9f3512f521aa06055807c0e720ae319233
-
SHA256
4e9e39595b36eda5ad4181e324560a423cd7119b8b666861d98181399df02989
-
SHA512
008f5c255b4cc1d291a92edba8e6cf79cbbe02ccb339ccbb10a96da24906d7f2bd5cb8567fd610fd0c5882156c75786567fb52a88cf7959c44ee4dc03de789f4
-
SSDEEP
12288:IibOqGDZLJLUf9snBS4csPYae6qfz0AA:FOFDhhUF54clNf70B
Score10/10-
Detects Echelon Stealer payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-