General

  • Target

    35c69ab07ba4fd97cb23a0351d7293b6

  • Size

    1.0MB

  • Sample

    231225-xhldvafabm

  • MD5

    35c69ab07ba4fd97cb23a0351d7293b6

  • SHA1

    65c3a14d30364f80ebda6cd1b83c6f9633291c35

  • SHA256

    f6d38b7dda48f70fabd8cf49cfb5191ef8bb4f351629c06ec102630d852da81c

  • SHA512

    072d19611df7a7807a4edff57befe8568132925b493cc7484684b59ef7cee31649eca13adafd3023f0a444241af6e571325880760b534990dfbac6a71bba1a70

  • SSDEEP

    24576:GE6pfUKdYS7gd1OAWUN3YWpLfoYZc4Up3GR6reDPdNyE:GE6pfUHSM1Oz20Gc+TdN

Malware Config

Targets

    • Target

      35c69ab07ba4fd97cb23a0351d7293b6

    • Size

      1.0MB

    • MD5

      35c69ab07ba4fd97cb23a0351d7293b6

    • SHA1

      65c3a14d30364f80ebda6cd1b83c6f9633291c35

    • SHA256

      f6d38b7dda48f70fabd8cf49cfb5191ef8bb4f351629c06ec102630d852da81c

    • SHA512

      072d19611df7a7807a4edff57befe8568132925b493cc7484684b59ef7cee31649eca13adafd3023f0a444241af6e571325880760b534990dfbac6a71bba1a70

    • SSDEEP

      24576:GE6pfUKdYS7gd1OAWUN3YWpLfoYZc4Up3GR6reDPdNyE:GE6pfUHSM1Oz20Gc+TdN

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks