General

  • Target

    1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc

  • Size

    656KB

  • Sample

    240122-bhytaadbfr

  • MD5

    e5c4dfc2eec2701e29fd4fbd9eeeaa74

  • SHA1

    229d7c107ba39d420ee2fcce7ed1dc9c268bd82b

  • SHA256

    1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc

  • SHA512

    ddf5e9417c5ac4c266a31ff272ceca596dc21b06258c21953e77c56135d726b3005b1ae14ef03472795335194360f7733d70bf24be8d2b4e2de1aa3ee09e724d

  • SSDEEP

    6144:0jsXsq2XgCnQ48gSO/+uCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsTDDpBu:0soLnpIQL32ikCaUS4csRBse6sfW/AA

Malware Config

Targets

    • Target

      1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc

    • Size

      656KB

    • MD5

      e5c4dfc2eec2701e29fd4fbd9eeeaa74

    • SHA1

      229d7c107ba39d420ee2fcce7ed1dc9c268bd82b

    • SHA256

      1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc

    • SHA512

      ddf5e9417c5ac4c266a31ff272ceca596dc21b06258c21953e77c56135d726b3005b1ae14ef03472795335194360f7733d70bf24be8d2b4e2de1aa3ee09e724d

    • SSDEEP

      6144:0jsXsq2XgCnQ48gSO/+uCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsTDDpBu:0soLnpIQL32ikCaUS4csRBse6sfW/AA

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks