General

  • Target

    aafc181ac5fa1474722cc4556bc2797773cea719caad63f7f6fcc23bac27db2e

  • Size

    6.6MB

  • Sample

    220312-ask5hadcc5

  • MD5

    dc70508f10ea72c1ad810c72b179bf28

  • SHA1

    5c7ef633b20ad47c1a9967a181ebf42a5094c07d

  • SHA256

    aafc181ac5fa1474722cc4556bc2797773cea719caad63f7f6fcc23bac27db2e

  • SHA512

    8dc1d9ef4c4b9b4fef91c55734a0e813b1a8a4582fab36b7b52c3b2c0d217a25dce3dbc1d364d438766c1fa8fc1f64498c2f779848a5208f2ea7ce06ed43f06b

Malware Config

Targets

    • Target

      aafc181ac5fa1474722cc4556bc2797773cea719caad63f7f6fcc23bac27db2e

    • Size

      6.6MB

    • MD5

      dc70508f10ea72c1ad810c72b179bf28

    • SHA1

      5c7ef633b20ad47c1a9967a181ebf42a5094c07d

    • SHA256

      aafc181ac5fa1474722cc4556bc2797773cea719caad63f7f6fcc23bac27db2e

    • SHA512

      8dc1d9ef4c4b9b4fef91c55734a0e813b1a8a4582fab36b7b52c3b2c0d217a25dce3dbc1d364d438766c1fa8fc1f64498c2f779848a5208f2ea7ce06ed43f06b

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • RevengeRat Executable

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks