General

  • Target

    2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662

  • Size

    1.1MB

  • Sample

    240120-bdvwtsggcn

  • MD5

    b5c6abc0206d3501b2fe4104ec7bb7cc

  • SHA1

    d767d16a38673ad60759fa67a542ca00a69e18f9

  • SHA256

    2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662

  • SHA512

    a2443a0e8c9a5fc9339fbf161b2aac68d8b82f673046fad964386a636036e68801650cdd311f6b8c616a78bbb5f62429f1b1effd1c1afd41ac17a31d8218ea50

  • SSDEEP

    24576:jBkVdlYAKA1WmEjLT25p2+484mraNt8AgF+3FyUOG0FcCPp:FsvT1m/TYZ1tO8bF+3FyU10OCPp

Malware Config

Targets

    • Target

      2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662

    • Size

      1.1MB

    • MD5

      b5c6abc0206d3501b2fe4104ec7bb7cc

    • SHA1

      d767d16a38673ad60759fa67a542ca00a69e18f9

    • SHA256

      2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662

    • SHA512

      a2443a0e8c9a5fc9339fbf161b2aac68d8b82f673046fad964386a636036e68801650cdd311f6b8c616a78bbb5f62429f1b1effd1c1afd41ac17a31d8218ea50

    • SSDEEP

      24576:jBkVdlYAKA1WmEjLT25p2+484mraNt8AgF+3FyUOG0FcCPp:FsvT1m/TYZ1tO8bF+3FyU10OCPp

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Impair Defenses

1
T1562

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Impact

Service Stop

1
T1489

Tasks