C:\Users\gg\Downloads\Echelon-Stealer-master\obj\Release\Echelon.pdb
Behavioral task
behavioral1
Sample
cd4a896224f9dcda6f0244bae4ef9abf.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
cd4a896224f9dcda6f0244bae4ef9abf.exe
Resource
win10v2004-20240226-en
General
-
Target
cd4a896224f9dcda6f0244bae4ef9abf
-
Size
581KB
-
MD5
cd4a896224f9dcda6f0244bae4ef9abf
-
SHA1
d362ab6e88e94c7a4200206f5d74c68eabc9dd07
-
SHA256
b7291b4d5bdaaffe9f29598bcf3dd822cee39b18d485d2071ee2ae41b9ccdfb2
-
SHA512
438f7ccb8b347c4928e1727b0800351b79308ee912272f85e0ec0c49c860216d102a06dd961044117f253cada879773bc9b76fdbf5b975a6af2238559d3a7f0d
-
SSDEEP
12288:wcQ6CmvZLJLUf9snBS4csPYae6qfzRAA:k6xvhhUF54clNf7RB
Malware Config
Signatures
-
Detects Echelon Stealer payload 1 IoCs
Processes:
resource yara_rule sample family_echelon -
Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID -
Detects executables referencing many VPN software clients. Observed in infosteslers 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_References_VPN -
Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_References_Confidential_Data_Store -
Detects executables referencing many email and collaboration clients. Observed in information stealers 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_References_Messaging_Clients -
Detects executables using Telegram Chat Bot 1 IoCs
Processes:
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Echelon family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cd4a896224f9dcda6f0244bae4ef9abf
Files
-
cd4a896224f9dcda6f0244bae4ef9abf.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
mscoree
_CorExeMain
Sections
.text Size: 578KB - Virtual size: 578KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ