General

  • Target

    d33967ebaa16503e91f891bd66ff6e7bf081de47ae790554b24a1733314d94be

  • Size

    1.1MB

  • Sample

    231228-bgd3gsgadj

  • MD5

    21baedb54f72d57d2d847d9352c8f91d

  • SHA1

    ab0bdda443b1720b9a023874ae91c950146579b0

  • SHA256

    d33967ebaa16503e91f891bd66ff6e7bf081de47ae790554b24a1733314d94be

  • SHA512

    0da246eba76c17d86f3409eee307c43542ad6d46902d6183f75404dd1c8b460696d100c758ea893a4a4f6034967d450ba621325b59ca7ebc60fd48c5ea5059bf

  • SSDEEP

    12288:tgGpzc0nT1aCX1TAlJjWWNQg3PcaMhljQATlQEhXbw7jKcQq6kAiJVORZy9:tgG5c0nTcwsWWR0PRThbw7jKDkANZk

Malware Config

Targets

    • Target

      d33967ebaa16503e91f891bd66ff6e7bf081de47ae790554b24a1733314d94be

    • Size

      1.1MB

    • MD5

      21baedb54f72d57d2d847d9352c8f91d

    • SHA1

      ab0bdda443b1720b9a023874ae91c950146579b0

    • SHA256

      d33967ebaa16503e91f891bd66ff6e7bf081de47ae790554b24a1733314d94be

    • SHA512

      0da246eba76c17d86f3409eee307c43542ad6d46902d6183f75404dd1c8b460696d100c758ea893a4a4f6034967d450ba621325b59ca7ebc60fd48c5ea5059bf

    • SSDEEP

      12288:tgGpzc0nT1aCX1TAlJjWWNQg3PcaMhljQATlQEhXbw7jKcQq6kAiJVORZy9:tgG5c0nTcwsWWR0PRThbw7jKDkANZk

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks