General
-
Target
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc
-
Size
656KB
-
Sample
240122-bhytaadbfr
-
MD5
e5c4dfc2eec2701e29fd4fbd9eeeaa74
-
SHA1
229d7c107ba39d420ee2fcce7ed1dc9c268bd82b
-
SHA256
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc
-
SHA512
ddf5e9417c5ac4c266a31ff272ceca596dc21b06258c21953e77c56135d726b3005b1ae14ef03472795335194360f7733d70bf24be8d2b4e2de1aa3ee09e724d
-
SSDEEP
6144:0jsXsq2XgCnQ48gSO/+uCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsTDDpBu:0soLnpIQL32ikCaUS4csRBse6sfW/AA
Behavioral task
behavioral1
Sample
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc
-
Size
656KB
-
MD5
e5c4dfc2eec2701e29fd4fbd9eeeaa74
-
SHA1
229d7c107ba39d420ee2fcce7ed1dc9c268bd82b
-
SHA256
1423c0bd9e24a29ae046e30a6bd8f93e2fb79ef5568a82982bfdea7dd7fbf6cc
-
SHA512
ddf5e9417c5ac4c266a31ff272ceca596dc21b06258c21953e77c56135d726b3005b1ae14ef03472795335194360f7733d70bf24be8d2b4e2de1aa3ee09e724d
-
SSDEEP
6144:0jsXsq2XgCnQ48gSO/+uCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsTDDpBu:0soLnpIQL32ikCaUS4csRBse6sfW/AA
Score10/10-
Detects Echelon Stealer payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-