General
-
Target
b0a31d78485b968c867f311a512443c64962701dfddd7929b7afec24deb3f747
-
Size
581KB
-
Sample
250203-be925swnfn
-
MD5
934de34c5ccb4bd0109547da976eb763
-
SHA1
0c10dafe3a76615a85d184e43c3d173144083771
-
SHA256
b0a31d78485b968c867f311a512443c64962701dfddd7929b7afec24deb3f747
-
SHA512
9f8e04a13700a73b28a4b40e7c1cb1771a7a03c4118a9f353cb5088a4e6451a44913fa77d8305918640a159360ca9a23ae25d11b631a5675522e0a0d70dde2f3
-
SSDEEP
12288:hWZ/TM1Y8AyNCzJs49ZLJLUf9snBS4csPYae6qfzyAA:s8j49hhUF54clNf7yB
Behavioral task
behavioral1
Sample
b0a31d78485b968c867f311a512443c64962701dfddd7929b7afec24deb3f747.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b0a31d78485b968c867f311a512443c64962701dfddd7929b7afec24deb3f747.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
b0a31d78485b968c867f311a512443c64962701dfddd7929b7afec24deb3f747
-
Size
581KB
-
MD5
934de34c5ccb4bd0109547da976eb763
-
SHA1
0c10dafe3a76615a85d184e43c3d173144083771
-
SHA256
b0a31d78485b968c867f311a512443c64962701dfddd7929b7afec24deb3f747
-
SHA512
9f8e04a13700a73b28a4b40e7c1cb1771a7a03c4118a9f353cb5088a4e6451a44913fa77d8305918640a159360ca9a23ae25d11b631a5675522e0a0d70dde2f3
-
SSDEEP
12288:hWZ/TM1Y8AyNCzJs49ZLJLUf9snBS4csPYae6qfzyAA:s8j49hhUF54clNf7yB
Score10/10-
Detects Echelon Stealer payload
-
Echelon family
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-