General

  • Target

    fbb2992be0509961aa9592a99cd13bdaac8eb4ab140672977fc882bcaf7f8fe2

  • Size

    573KB

  • Sample

    240315-cfw3cafh27

  • MD5

    ee000a7fa90440f296205d2bd9c94a23

  • SHA1

    a497e8634d42a15afc7004b010b1c2bc8fc71b93

  • SHA256

    fbb2992be0509961aa9592a99cd13bdaac8eb4ab140672977fc882bcaf7f8fe2

  • SHA512

    7b1fa56b033485dd67595c95122e4c73dad54f41f4366faa69d56ed7d8095eb745e591cc2601ad647d3127ba5481be8d1d99f07aa74fb89c47651f2f3e17248d

  • SSDEEP

    12288:6tYZ/ZLVO2tyAZLJLUf9snBS4csPYae6qfzuQA3r/:6tYZxLBhhUF54clNf7uR3r/

Malware Config

Targets

    • Target

      fbb2992be0509961aa9592a99cd13bdaac8eb4ab140672977fc882bcaf7f8fe2

    • Size

      573KB

    • MD5

      ee000a7fa90440f296205d2bd9c94a23

    • SHA1

      a497e8634d42a15afc7004b010b1c2bc8fc71b93

    • SHA256

      fbb2992be0509961aa9592a99cd13bdaac8eb4ab140672977fc882bcaf7f8fe2

    • SHA512

      7b1fa56b033485dd67595c95122e4c73dad54f41f4366faa69d56ed7d8095eb745e591cc2601ad647d3127ba5481be8d1d99f07aa74fb89c47651f2f3e17248d

    • SSDEEP

      12288:6tYZ/ZLVO2tyAZLJLUf9snBS4csPYae6qfzuQA3r/:6tYZxLBhhUF54clNf7uR3r/

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks