General

  • Target

    4a4af8e54cb3d761b6b06d20c469f0acb9de78cc3e84f10546eb521166e571b0

  • Size

    657KB

  • Sample

    240122-bfl2psdfa7

  • MD5

    7faf185778817c2fda5709f6d47946e8

  • SHA1

    7a41134e058dcae033167e30e12a55533724fcc3

  • SHA256

    4a4af8e54cb3d761b6b06d20c469f0acb9de78cc3e84f10546eb521166e571b0

  • SHA512

    a52eacc2b0ff47d81694d2dcf89c399ffae30a13ddcb30dd34a356462f619b3f7d52b2afa9baed09050d08344a010df7d0ad74a4298dde86257a51ec4a1f939a

  • SSDEEP

    12288:kEEwSHwn+DQL32ikCaUS4csRBse6sfWfAA:kEEzQOy3k94cunZefB

Malware Config

Targets

    • Target

      4a4af8e54cb3d761b6b06d20c469f0acb9de78cc3e84f10546eb521166e571b0

    • Size

      657KB

    • MD5

      7faf185778817c2fda5709f6d47946e8

    • SHA1

      7a41134e058dcae033167e30e12a55533724fcc3

    • SHA256

      4a4af8e54cb3d761b6b06d20c469f0acb9de78cc3e84f10546eb521166e571b0

    • SHA512

      a52eacc2b0ff47d81694d2dcf89c399ffae30a13ddcb30dd34a356462f619b3f7d52b2afa9baed09050d08344a010df7d0ad74a4298dde86257a51ec4a1f939a

    • SSDEEP

      12288:kEEwSHwn+DQL32ikCaUS4csRBse6sfWfAA:kEEzQOy3k94cunZefB

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks