General

  • Target

    5c4a994d5c837fd1f9acfe9961bbb4bd5f01d4e6e9b6f2d0ff20d812bb38a33b

  • Size

    958KB

  • Sample

    220801-sf4p7abddk

  • MD5

    510f9e146edd3103ddd4b7da3f6521ee

  • SHA1

    affc015f99525fd0884c06812a54af3557331a5e

  • SHA256

    5c4a994d5c837fd1f9acfe9961bbb4bd5f01d4e6e9b6f2d0ff20d812bb38a33b

  • SHA512

    b2e94a1f2f169d0275102072644b6ff8729a74acadfa0328ac7baca6bec198ce119556e8719c015bb205f437fbd4ad9973875f9d5c82dc89f9841303914c6231

Malware Config

Targets

    • Target

      5c4a994d5c837fd1f9acfe9961bbb4bd5f01d4e6e9b6f2d0ff20d812bb38a33b

    • Size

      958KB

    • MD5

      510f9e146edd3103ddd4b7da3f6521ee

    • SHA1

      affc015f99525fd0884c06812a54af3557331a5e

    • SHA256

      5c4a994d5c837fd1f9acfe9961bbb4bd5f01d4e6e9b6f2d0ff20d812bb38a33b

    • SHA512

      b2e94a1f2f169d0275102072644b6ff8729a74acadfa0328ac7baca6bec198ce119556e8719c015bb205f437fbd4ad9973875f9d5c82dc89f9841303914c6231

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks