General

  • Target

    3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70

  • Size

    656KB

  • Sample

    240122-bhxk8adff2

  • MD5

    626aca97418ada2bc315802cf7d82324

  • SHA1

    db7d1bf5ab75ce2b706b777e5a190e25e9e7e34c

  • SHA256

    3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70

  • SHA512

    58ba6a6d574701401187ee84ebd27495ce02de89fce7e2d5becc34fcedcadd4bfc156fe0ae987a024f1a203f62605697c9ec320c2b0bab3e6dade1218f2552e9

  • SSDEEP

    12288:ksJ7oInpeQL32ikCaUS4csRBse6sfWqAA:RJBwy3k94cunZeqB

Malware Config

Targets

    • Target

      3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70

    • Size

      656KB

    • MD5

      626aca97418ada2bc315802cf7d82324

    • SHA1

      db7d1bf5ab75ce2b706b777e5a190e25e9e7e34c

    • SHA256

      3c12a45f6d2de9dd922061f6a503f9cda2f297823d9c1561b0cdde9eb62cfb70

    • SHA512

      58ba6a6d574701401187ee84ebd27495ce02de89fce7e2d5becc34fcedcadd4bfc156fe0ae987a024f1a203f62605697c9ec320c2b0bab3e6dade1218f2552e9

    • SSDEEP

      12288:ksJ7oInpeQL32ikCaUS4csRBse6sfWqAA:RJBwy3k94cunZeqB

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks