General
-
Target
3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70
-
Size
656KB
-
Sample
240122-bhxk8adff2
-
MD5
626aca97418ada2bc315802cf7d82324
-
SHA1
db7d1bf5ab75ce2b706b777e5a190e25e9e7e34c
-
SHA256
3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70
-
SHA512
58ba6a6d574701401187ee84ebd27495ce02de89fce7e2d5becc34fcedcadd4bfc156fe0ae987a024f1a203f62605697c9ec320c2b0bab3e6dade1218f2552e9
-
SSDEEP
12288:ksJ7oInpeQL32ikCaUS4csRBse6sfWqAA:RJBwy3k94cunZeqB
Behavioral task
behavioral1
Sample
3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70
-
Size
656KB
-
MD5
626aca97418ada2bc315802cf7d82324
-
SHA1
db7d1bf5ab75ce2b706b777e5a190e25e9e7e34c
-
SHA256
3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70
-
SHA512
58ba6a6d574701401187ee84ebd27495ce02de89fce7e2d5becc34fcedcadd4bfc156fe0ae987a024f1a203f62605697c9ec320c2b0bab3e6dade1218f2552e9
-
SSDEEP
12288:ksJ7oInpeQL32ikCaUS4csRBse6sfWqAA:RJBwy3k94cunZeqB
-
Detects Echelon Stealer payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-