Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-01-2024 01:05
Behavioral task
behavioral1
Sample
f1d3b652d8026acb0c7fcd47cd8a86002078a4d5ff752e890de2e320341cee39.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
f1d3b652d8026acb0c7fcd47cd8a86002078a4d5ff752e890de2e320341cee39.exe
-
Size
659KB
-
MD5
92933a0252bc4abf9ed78609672226f6
-
SHA1
c737bfb1cf71acd63803e3c78c1e1ed4ccda640e
-
SHA256
f1d3b652d8026acb0c7fcd47cd8a86002078a4d5ff752e890de2e320341cee39
-
SHA512
9a28da55f116c472d712c57ec2fef6bb80e2779d485d61f66b5176f15e8a8ea9093a572f8df541c1b7b7864d5c3f7cb055663ccb23cb7871689d1ad7c8785a05
-
SSDEEP
12288:pA03baY4nblrmoQL32ikCaUS4csRBse6sfWmAA:pA03baYabUoy3k94cunZemB
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1396-0-0x000002795C0B0000-0x000002795C15A000-memory.dmp family_echelon -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f1d3b652d8026acb0c7fcd47cd8a86002078a4d5ff752e890de2e320341cee39.exedescription pid Process Token: SeDebugPrivilege 1396 f1d3b652d8026acb0c7fcd47cd8a86002078a4d5ff752e890de2e320341cee39.exe