General
-
Target
2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662
-
Size
1.1MB
-
Sample
240120-bdvwtsggcn
-
MD5
b5c6abc0206d3501b2fe4104ec7bb7cc
-
SHA1
d767d16a38673ad60759fa67a542ca00a69e18f9
-
SHA256
2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662
-
SHA512
a2443a0e8c9a5fc9339fbf161b2aac68d8b82f673046fad964386a636036e68801650cdd311f6b8c616a78bbb5f62429f1b1effd1c1afd41ac17a31d8218ea50
-
SSDEEP
24576:jBkVdlYAKA1WmEjLT25p2+484mraNt8AgF+3FyUOG0FcCPp:FsvT1m/TYZ1tO8bF+3FyU10OCPp
Static task
static1
Behavioral task
behavioral1
Sample
2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662
-
Size
1.1MB
-
MD5
b5c6abc0206d3501b2fe4104ec7bb7cc
-
SHA1
d767d16a38673ad60759fa67a542ca00a69e18f9
-
SHA256
2bce48850beab2fab1bd1d305c442a50c37e6713b44036bef6518f4d941fd662
-
SHA512
a2443a0e8c9a5fc9339fbf161b2aac68d8b82f673046fad964386a636036e68801650cdd311f6b8c616a78bbb5f62429f1b1effd1c1afd41ac17a31d8218ea50
-
SSDEEP
24576:jBkVdlYAKA1WmEjLT25p2+484mraNt8AgF+3FyUOG0FcCPp:FsvT1m/TYZ1tO8bF+3FyU10OCPp
-
Detects Echelon Stealer payload
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-