General

  • Target

    2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1

  • Size

    1.1MB

  • Sample

    250129-bl765awnhy

  • MD5

    4df9058284f3097bd325add24658a4fb

  • SHA1

    4279798548d1425cae83239357867106fe336cd4

  • SHA256

    2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1

  • SHA512

    e3fd82fdbd6ad37b591e2132ffaec4f0d619cade1f4af4a94794cc01a5a48b499430da9d790517167bba3d8c75e50f08fc38c3c22a148b2c79ed17c3d1a19101

  • SSDEEP

    12288:ggEMBID71CWeVdxB5uRaWmk93sYvBFaXQAT2QEhXbwsjJEY+nZAudhgIQnOyI:ggEMBID78l4aW+4iRTCbwsjJF+nZAIz

Malware Config

Targets

    • Target

      2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1

    • Size

      1.1MB

    • MD5

      4df9058284f3097bd325add24658a4fb

    • SHA1

      4279798548d1425cae83239357867106fe336cd4

    • SHA256

      2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1

    • SHA512

      e3fd82fdbd6ad37b591e2132ffaec4f0d619cade1f4af4a94794cc01a5a48b499430da9d790517167bba3d8c75e50f08fc38c3c22a148b2c79ed17c3d1a19101

    • SSDEEP

      12288:ggEMBID71CWeVdxB5uRaWmk93sYvBFaXQAT2QEhXbwsjJEY+nZAudhgIQnOyI:ggEMBID78l4aW+4iRTCbwsjJF+nZAIz

    • Detects Echelon Stealer payload

    • Echelon

      Echelon is a .NET stealer that targets passwords from browsers, email and cryptocurrency clients.

    • Echelon family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks