General

  • Target

    a00cac3fbd48c43d65837efee960492c4843e8ae76a2745a35206d59287bb7b7

  • Size

    949KB

  • Sample

    220625-lfmncahac6

  • MD5

    9596164a5d9b017918e8ebec60739069

  • SHA1

    7ad289bc302be09fcfe3e7846253c584f251d398

  • SHA256

    a00cac3fbd48c43d65837efee960492c4843e8ae76a2745a35206d59287bb7b7

  • SHA512

    0b2f9001e84f68e65cf53334a8b72644d609c99590dfb5a8155ce1fa4d704f6bcec541e3602a191d9769118864812d8e0ec12f4509f69a89f6142cbff5b11b2e

Malware Config

Targets

    • Target

      a00cac3fbd48c43d65837efee960492c4843e8ae76a2745a35206d59287bb7b7

    • Size

      949KB

    • MD5

      9596164a5d9b017918e8ebec60739069

    • SHA1

      7ad289bc302be09fcfe3e7846253c584f251d398

    • SHA256

      a00cac3fbd48c43d65837efee960492c4843e8ae76a2745a35206d59287bb7b7

    • SHA512

      0b2f9001e84f68e65cf53334a8b72644d609c99590dfb5a8155ce1fa4d704f6bcec541e3602a191d9769118864812d8e0ec12f4509f69a89f6142cbff5b11b2e

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks