Behavioral task
behavioral1
Sample
d1b01198e7d83256c27540b075ce9de4e18cac1c73e83001d9e7398e8fbb2549.exe
Resource
win7-20231215-en
General
-
Target
d1b01198e7d83256c27540b075ce9de4e18cac1c73e83001d9e7398e8fbb2549
-
Size
653KB
-
MD5
4d5105d2259c6392e806eb17794a31cd
-
SHA1
ec92cb1cefcf9a3e92dbbf68c7566f3435942dd1
-
SHA256
d1b01198e7d83256c27540b075ce9de4e18cac1c73e83001d9e7398e8fbb2549
-
SHA512
49aa185eb5331e1d6449d23cfffa8875c1964ee8f6e136fdc07a4ffa204a2d9458ae30d7567b8cb8504ebf19072411f33163f5a6efdb0ba12741c2ab3ac8b2ed
-
SSDEEP
6144:CmDm/12Uqs/nh7IyMSogUNKSuCInHLhJI4FY/ixjci6ychf8xalGQGtSV41kJDsY:LD4wyxQQL32ikCaUS4csRBse6sfWdAA
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule sample family_echelon -
Echelon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d1b01198e7d83256c27540b075ce9de4e18cac1c73e83001d9e7398e8fbb2549
Files
-
d1b01198e7d83256c27540b075ce9de4e18cac1c73e83001d9e7398e8fbb2549.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 650KB - Virtual size: 650KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ