General

  • Target

    7135b5be3dc2a1cb7f2dc06a6b22bcd2d52a7e999753c4d268ef95fa14cffda9

  • Size

    574KB

  • Sample

    240107-bdpd2sbdem

  • MD5

    e3d29040c5011f9f95e3ffb35e3aea6e

  • SHA1

    004c45ddd1034b7704ae170321732cc7c0a9c443

  • SHA256

    7135b5be3dc2a1cb7f2dc06a6b22bcd2d52a7e999753c4d268ef95fa14cffda9

  • SHA512

    1beaf5140e160fb1e5ebec739511dc064d036a0f2b36b27f0b1da577c09686624da3035e68af8fbbe4578a5dec5fb0d3bd8289de4758f7cddb04c02c4ba02e5d

  • SSDEEP

    12288:d+pNyY47ela4ZLJLUf9snBS4csPYae6qfzuQAxhp:d+pNZ4KhhUF54clNf7uRDp

Malware Config

Targets

    • Target

      7135b5be3dc2a1cb7f2dc06a6b22bcd2d52a7e999753c4d268ef95fa14cffda9

    • Size

      574KB

    • MD5

      e3d29040c5011f9f95e3ffb35e3aea6e

    • SHA1

      004c45ddd1034b7704ae170321732cc7c0a9c443

    • SHA256

      7135b5be3dc2a1cb7f2dc06a6b22bcd2d52a7e999753c4d268ef95fa14cffda9

    • SHA512

      1beaf5140e160fb1e5ebec739511dc064d036a0f2b36b27f0b1da577c09686624da3035e68af8fbbe4578a5dec5fb0d3bd8289de4758f7cddb04c02c4ba02e5d

    • SSDEEP

      12288:d+pNyY47ela4ZLJLUf9snBS4csPYae6qfzuQAxhp:d+pNZ4KhhUF54clNf7uRDp

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks