General
-
Target
2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1
-
Size
1.1MB
-
Sample
250129-bl765awnhy
-
MD5
4df9058284f3097bd325add24658a4fb
-
SHA1
4279798548d1425cae83239357867106fe336cd4
-
SHA256
2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1
-
SHA512
e3fd82fdbd6ad37b591e2132ffaec4f0d619cade1f4af4a94794cc01a5a48b499430da9d790517167bba3d8c75e50f08fc38c3c22a148b2c79ed17c3d1a19101
-
SSDEEP
12288:ggEMBID71CWeVdxB5uRaWmk93sYvBFaXQAT2QEhXbwsjJEY+nZAudhgIQnOyI:ggEMBID78l4aW+4iRTCbwsjJF+nZAIz
Behavioral task
behavioral1
Sample
2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1
-
Size
1.1MB
-
MD5
4df9058284f3097bd325add24658a4fb
-
SHA1
4279798548d1425cae83239357867106fe336cd4
-
SHA256
2c374e6ae5b72ea2f8acc2fde42a660248e41eaa3728fb8a55a033b1c884b2d1
-
SHA512
e3fd82fdbd6ad37b591e2132ffaec4f0d619cade1f4af4a94794cc01a5a48b499430da9d790517167bba3d8c75e50f08fc38c3c22a148b2c79ed17c3d1a19101
-
SSDEEP
12288:ggEMBID71CWeVdxB5uRaWmk93sYvBFaXQAT2QEhXbwsjJEY+nZAudhgIQnOyI:ggEMBID78l4aW+4iRTCbwsjJF+nZAIz
Score10/10-
Detects Echelon Stealer payload
-
Echelon family
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-