General

  • Target

    3b163eddf849e4c53923fe275b320081e31badc3f1b42b239bd6efbdbed93e3d

  • Size

    661KB

  • Sample

    220311-bhmq1shaeq

  • MD5

    a302f849f03f9d0986062f4eb4032824

  • SHA1

    15848e1df366bf37158cc70ab13f01a693a733f0

  • SHA256

    3b163eddf849e4c53923fe275b320081e31badc3f1b42b239bd6efbdbed93e3d

  • SHA512

    46154fc25ce18e92d0c360d9bb8a323304824bb6ae6a0c73a6dad64721d4891a2536b3f40b5c0ac76013a9ed3877dbc38470a0d956b8b79ad565d5052731ea36

Malware Config

Targets

    • Target

      3b163eddf849e4c53923fe275b320081e31badc3f1b42b239bd6efbdbed93e3d

    • Size

      661KB

    • MD5

      a302f849f03f9d0986062f4eb4032824

    • SHA1

      15848e1df366bf37158cc70ab13f01a693a733f0

    • SHA256

      3b163eddf849e4c53923fe275b320081e31badc3f1b42b239bd6efbdbed93e3d

    • SHA512

      46154fc25ce18e92d0c360d9bb8a323304824bb6ae6a0c73a6dad64721d4891a2536b3f40b5c0ac76013a9ed3877dbc38470a0d956b8b79ad565d5052731ea36

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks