Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2024, 01:05
Behavioral task
behavioral1
Sample
50ec312ca31e71d5128358026056711660baacc13e9a88af64363155dca7df79.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
50ec312ca31e71d5128358026056711660baacc13e9a88af64363155dca7df79.exe
-
Size
659KB
-
MD5
e2812ccf1dd1f50c7a435e8c30b151a8
-
SHA1
0d76a779b75599e30a43f8a03f5581c8f3e19e2a
-
SHA256
50ec312ca31e71d5128358026056711660baacc13e9a88af64363155dca7df79
-
SHA512
c716c58a4c66cf27ea22c2e7042391d27209d138d01b4fdc14576d0f8546d62cebf7d9956c44705802df722e41bb45b9aff27a4e94afa04ec1230646d3885009
-
SSDEEP
12288:yA03baYUMm7XEOfQL32ikCaUS4csRBse6sfWnAA:yA03baYUBjfy3k94cunZenB
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
resource yara_rule behavioral2/memory/1680-0-0x0000021228C20000-0x0000021228CCC000-memory.dmp family_echelon -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1680 50ec312ca31e71d5128358026056711660baacc13e9a88af64363155dca7df79.exe