General

  • Target

    5a770772b4d547660b1c784c094f08ce7547d6bcea38b31056397506461371fc

  • Size

    836KB

  • Sample

    220802-d1k19aghf5

  • MD5

    24d7e953e0e46be83259ee83168f7088

  • SHA1

    b36eb7432248d008797aa3d45bdc0df6e15b6862

  • SHA256

    5a770772b4d547660b1c784c094f08ce7547d6bcea38b31056397506461371fc

  • SHA512

    246136880d077ed6c7fde2ee491f644954e6640c518cf6324d2fe4a4750db5121a324f763559ac6714410506c1dc2ad31d719cba7369ed8b2d1113a8becc6a55

Malware Config

Targets

    • Target

      5a770772b4d547660b1c784c094f08ce7547d6bcea38b31056397506461371fc

    • Size

      836KB

    • MD5

      24d7e953e0e46be83259ee83168f7088

    • SHA1

      b36eb7432248d008797aa3d45bdc0df6e15b6862

    • SHA256

      5a770772b4d547660b1c784c094f08ce7547d6bcea38b31056397506461371fc

    • SHA512

      246136880d077ed6c7fde2ee491f644954e6640c518cf6324d2fe4a4750db5121a324f763559ac6714410506c1dc2ad31d719cba7369ed8b2d1113a8becc6a55

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks