Resubmissions

14-08-2024 19:56

240814-ynzn4awdlj 10

General

  • Target

    Echo.exe

  • Size

    18.6MB

  • Sample

    240814-ynzn4awdlj

  • MD5

    f67a47664fb1469352a5e8fad6116aca

  • SHA1

    41264d50d7b684f7190ac90a229a7185d698dca1

  • SHA256

    6996588ae456c00ba2877ff18d10dcaa6f6a28eaa688b514f6d4564cf26d5bb5

  • SHA512

    3b49b4658ac7665c9eea4fabff0a665cb635f90b348bdb3876b4b1f7d835197723688cf18dc9e824ffa1e89076e5d6bbdc6fc3c23a00a1ee1dc3ceb84ce94d23

  • SSDEEP

    393216:AqPnLFXlr4mQ8DOETgsvfGmgjFWsCvE4oqWTD3ym:BPLFXN/QhEpcFQWTP

Malware Config

Targets

    • Target

      Echo.exe

    • Size

      18.6MB

    • MD5

      f67a47664fb1469352a5e8fad6116aca

    • SHA1

      41264d50d7b684f7190ac90a229a7185d698dca1

    • SHA256

      6996588ae456c00ba2877ff18d10dcaa6f6a28eaa688b514f6d4564cf26d5bb5

    • SHA512

      3b49b4658ac7665c9eea4fabff0a665cb635f90b348bdb3876b4b1f7d835197723688cf18dc9e824ffa1e89076e5d6bbdc6fc3c23a00a1ee1dc3ceb84ce94d23

    • SSDEEP

      393216:AqPnLFXlr4mQ8DOETgsvfGmgjFWsCvE4oqWTD3ym:BPLFXN/QhEpcFQWTP

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks