General
-
Target
f434179beb8eb2897362648c6ba97c99b7747cdad56da4336135deef4c56c04b
-
Size
581KB
-
Sample
250216-bfdekatrds
-
MD5
3360120055173db774e063dcea258471
-
SHA1
2b5c28b8775dad0fcbf8b96998ad2f44970f71e6
-
SHA256
f434179beb8eb2897362648c6ba97c99b7747cdad56da4336135deef4c56c04b
-
SHA512
a8f8cd83783cfb9017b30c291bac9a96b2e41f107738459928d15e7337632a946881ab1095115eb4f47db56a74026cd05cc8efba593504d333605d9cb7fe36d9
-
SSDEEP
12288:OWZ/TM1Y8AyNCzJciFZLJLUf9snBS4csPYae6qfzRAA:B8LiFhhUF54clNf7RB
Behavioral task
behavioral1
Sample
f434179beb8eb2897362648c6ba97c99b7747cdad56da4336135deef4c56c04b.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
f434179beb8eb2897362648c6ba97c99b7747cdad56da4336135deef4c56c04b.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
f434179beb8eb2897362648c6ba97c99b7747cdad56da4336135deef4c56c04b
-
Size
581KB
-
MD5
3360120055173db774e063dcea258471
-
SHA1
2b5c28b8775dad0fcbf8b96998ad2f44970f71e6
-
SHA256
f434179beb8eb2897362648c6ba97c99b7747cdad56da4336135deef4c56c04b
-
SHA512
a8f8cd83783cfb9017b30c291bac9a96b2e41f107738459928d15e7337632a946881ab1095115eb4f47db56a74026cd05cc8efba593504d333605d9cb7fe36d9
-
SSDEEP
12288:OWZ/TM1Y8AyNCzJciFZLJLUf9snBS4csPYae6qfzRAA:B8LiFhhUF54clNf7RB
Score10/10-
Detects Echelon Stealer payload
-
Echelon family
-
Downloads MZ/PE file
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2