General
-
Target
fc33d5eff1235391ea7d1f28e50d8a15e630042211bcb1a4dc3616d78b6c43a2
-
Size
581KB
-
Sample
240304-bmtp5adh3s
-
MD5
80a90d5cf1639d82b28c78b398acc1f4
-
SHA1
f81ad759dbb843058cfe28776d5c7990db6e6f74
-
SHA256
fc33d5eff1235391ea7d1f28e50d8a15e630042211bcb1a4dc3616d78b6c43a2
-
SHA512
db793d060a82339b9bf87a3e0b2069a4ff720e88161328795026871d90e4cc108726fa28f94cebcac4216847dba3ddaddfc820bd17545e18ca64063bf19f7944
-
SSDEEP
12288:9ctvPYVlNWEZkVlFrGZLJLUf9snBS4csPYae6qfzEAA:usUrGhhUF54clNf7EB
Behavioral task
behavioral1
Sample
fc33d5eff1235391ea7d1f28e50d8a15e630042211bcb1a4dc3616d78b6c43a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc33d5eff1235391ea7d1f28e50d8a15e630042211bcb1a4dc3616d78b6c43a2.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
fc33d5eff1235391ea7d1f28e50d8a15e630042211bcb1a4dc3616d78b6c43a2
-
Size
581KB
-
MD5
80a90d5cf1639d82b28c78b398acc1f4
-
SHA1
f81ad759dbb843058cfe28776d5c7990db6e6f74
-
SHA256
fc33d5eff1235391ea7d1f28e50d8a15e630042211bcb1a4dc3616d78b6c43a2
-
SHA512
db793d060a82339b9bf87a3e0b2069a4ff720e88161328795026871d90e4cc108726fa28f94cebcac4216847dba3ddaddfc820bd17545e18ca64063bf19f7944
-
SSDEEP
12288:9ctvPYVlNWEZkVlFrGZLJLUf9snBS4csPYae6qfzEAA:usUrGhhUF54clNf7EB
Score10/10-
Detects Echelon Stealer payload
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-