Analysis

  • max time kernel
    137s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-02-2024 01:29

General

  • Target

    607241f1d3734cec39869a0a2ffaf969ced0f1953fcf8d79f15c68911fd5deae.exe

  • Size

    99KB

  • MD5

    1d8121368bf1309b6e74d33bed7bd18d

  • SHA1

    45ae5348faac14c78a8a1b40f4bfa982d4c52ddd

  • SHA256

    607241f1d3734cec39869a0a2ffaf969ced0f1953fcf8d79f15c68911fd5deae

  • SHA512

    0ef35fb90dda505f0fecf875fa0834b02b728da9111c3a4b5abb6e17157b68fbef6f4bd7a66a7edc7ba29462f371fdbe1b015a505dfb992f82e07769e8502a40

  • SSDEEP

    3072:zUgSQhPduEyU1jxACwGI6omgyQm4IIGVyM0mby5oBl1XPE:zUgSQhluEyU1jxACwGI6omgyQm47pTmB

Score
10/10

Malware Config

Signatures

  • Detects Echelon Stealer payload 1 IoCs
  • Echelon

    Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

Processes

  • C:\Users\Admin\AppData\Local\Temp\607241f1d3734cec39869a0a2ffaf969ced0f1953fcf8d79f15c68911fd5deae.exe
    "C:\Users\Admin\AppData\Local\Temp\607241f1d3734cec39869a0a2ffaf969ced0f1953fcf8d79f15c68911fd5deae.exe"
    1⤵
      PID:3448

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3448-0-0x000001A605080000-0x000001A6050A0000-memory.dmp

      Filesize

      128KB

    • memory/3448-1-0x00007FFAFEA80000-0x00007FFAFF541000-memory.dmp

      Filesize

      10.8MB

    • memory/3448-2-0x00007FFAFEA80000-0x00007FFAFF541000-memory.dmp

      Filesize

      10.8MB