General
-
Target
e09b3349afedd9bc6713f0640dac5a73
-
Size
3.7MB
-
Sample
240327-djesxabc64
-
MD5
e09b3349afedd9bc6713f0640dac5a73
-
SHA1
2bed69865fce75b42da5f53b02d74eaba01f7819
-
SHA256
f8cad8601b4d97cbe6befe13fce900eaa01063283a91ffae28038c9370f7b582
-
SHA512
48ed49531d29f503f1c8f25ab278de851560576aca96baa521b0c1b1b6b2887ba6c6d71cbed0049faaeb1c4c8b531b186f7eba5cd141ae1ececafc3aa280a213
-
SSDEEP
98304:VG0WE8JkdS9cHaXMsbNWhYq3bdckunUnU63:fvNIc6XyYq3bHtX
Behavioral task
behavioral1
Sample
e09b3349afedd9bc6713f0640dac5a73.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e09b3349afedd9bc6713f0640dac5a73.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
e09b3349afedd9bc6713f0640dac5a73
-
Size
3.7MB
-
MD5
e09b3349afedd9bc6713f0640dac5a73
-
SHA1
2bed69865fce75b42da5f53b02d74eaba01f7819
-
SHA256
f8cad8601b4d97cbe6befe13fce900eaa01063283a91ffae28038c9370f7b582
-
SHA512
48ed49531d29f503f1c8f25ab278de851560576aca96baa521b0c1b1b6b2887ba6c6d71cbed0049faaeb1c4c8b531b186f7eba5cd141ae1ececafc3aa280a213
-
SSDEEP
98304:VG0WE8JkdS9cHaXMsbNWhYq3bdckunUnU63:fvNIc6XyYq3bHtX
-
Detects Echelon Stealer payload
-
Echelon - DarkStealer Fork
Payload resembles modified variant of Echelon Stealer called DarkStealer.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-