General

  • Target

    d95d6f809e822596a3bdd3feac8cfb5dc9a2a36c02b7f64f4f8d215830853e79

  • Size

    581KB

  • Sample

    240202-b1b28sdbeq

  • MD5

    12dd57211a76fba4337bdecd9a542313

  • SHA1

    03e2c2cc5964d5e3eec6ac93f0bdb1b505d9c4a9

  • SHA256

    d95d6f809e822596a3bdd3feac8cfb5dc9a2a36c02b7f64f4f8d215830853e79

  • SHA512

    7ca1cbda77ec82f63612848693c9e8017288acb5f230bbe8ae5e4374cadada1a3391e67eca0eb66abcac79abd4dec7b0479633a50669829f30434f46cb145be6

  • SSDEEP

    12288:cu5kjMFW/Yq9a7p8r1ZLJLUf9snBS4csPYae6qfzMAA:wcwr1hhUF54clNf7MB

Malware Config

Targets

    • Target

      d95d6f809e822596a3bdd3feac8cfb5dc9a2a36c02b7f64f4f8d215830853e79

    • Size

      581KB

    • MD5

      12dd57211a76fba4337bdecd9a542313

    • SHA1

      03e2c2cc5964d5e3eec6ac93f0bdb1b505d9c4a9

    • SHA256

      d95d6f809e822596a3bdd3feac8cfb5dc9a2a36c02b7f64f4f8d215830853e79

    • SHA512

      7ca1cbda77ec82f63612848693c9e8017288acb5f230bbe8ae5e4374cadada1a3391e67eca0eb66abcac79abd4dec7b0479633a50669829f30434f46cb145be6

    • SSDEEP

      12288:cu5kjMFW/Yq9a7p8r1ZLJLUf9snBS4csPYae6qfzMAA:wcwr1hhUF54clNf7MB

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks