General
-
Target
b7291b4d5bdaaffe9f29598bcf3dd822cee39b18d485d2071ee2ae41b9ccdfb2
-
Size
581KB
-
Sample
240226-bpenzshb96
-
MD5
cd4a896224f9dcda6f0244bae4ef9abf
-
SHA1
d362ab6e88e94c7a4200206f5d74c68eabc9dd07
-
SHA256
b7291b4d5bdaaffe9f29598bcf3dd822cee39b18d485d2071ee2ae41b9ccdfb2
-
SHA512
438f7ccb8b347c4928e1727b0800351b79308ee912272f85e0ec0c49c860216d102a06dd961044117f253cada879773bc9b76fdbf5b975a6af2238559d3a7f0d
-
SSDEEP
12288:wcQ6CmvZLJLUf9snBS4csPYae6qfzRAA:k6xvhhUF54clNf7RB
Behavioral task
behavioral1
Sample
b7291b4d5bdaaffe9f29598bcf3dd822cee39b18d485d2071ee2ae41b9ccdfb2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7291b4d5bdaaffe9f29598bcf3dd822cee39b18d485d2071ee2ae41b9ccdfb2.exe
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
b7291b4d5bdaaffe9f29598bcf3dd822cee39b18d485d2071ee2ae41b9ccdfb2
-
Size
581KB
-
MD5
cd4a896224f9dcda6f0244bae4ef9abf
-
SHA1
d362ab6e88e94c7a4200206f5d74c68eabc9dd07
-
SHA256
b7291b4d5bdaaffe9f29598bcf3dd822cee39b18d485d2071ee2ae41b9ccdfb2
-
SHA512
438f7ccb8b347c4928e1727b0800351b79308ee912272f85e0ec0c49c860216d102a06dd961044117f253cada879773bc9b76fdbf5b975a6af2238559d3a7f0d
-
SSDEEP
12288:wcQ6CmvZLJLUf9snBS4csPYae6qfzRAA:k6xvhhUF54clNf7RB
Score10/10-
Detects Echelon Stealer payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-