General

  • Target

    a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

  • Size

    1.3MB

  • Sample

    221003-a8bwrshfc9

  • MD5

    24fed3f31bf8912606adb5862ceb3ac8

  • SHA1

    f2ba97e8cba9f8f24142ac2f1daee67783fb80ee

  • SHA256

    a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

  • SHA512

    48eeb947ffeaa991e129f70b3782bf7b8d75f1d95a4b25d8dccc871f4e4fe75c9af422590d015c602e3eedda153b7f8015e4153f4f871a9be3a1606452ddedf0

  • SSDEEP

    24576:9BxmWHAs0A6yDW3Yzv7NeGd6znhc2eEUWXXL9VAIEqJTsj7/pTA:9LhHAbz07jMC2eDWnXAIEx/1

Malware Config

Targets

    • Target

      a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

    • Size

      1.3MB

    • MD5

      24fed3f31bf8912606adb5862ceb3ac8

    • SHA1

      f2ba97e8cba9f8f24142ac2f1daee67783fb80ee

    • SHA256

      a4aa3cbf18e122b9967117aa3ebcb776886ac92973aeb9cfccb6176294d24b94

    • SHA512

      48eeb947ffeaa991e129f70b3782bf7b8d75f1d95a4b25d8dccc871f4e4fe75c9af422590d015c602e3eedda153b7f8015e4153f4f871a9be3a1606452ddedf0

    • SSDEEP

      24576:9BxmWHAs0A6yDW3Yzv7NeGd6znhc2eEUWXXL9VAIEqJTsj7/pTA:9LhHAbz07jMC2eDWnXAIEx/1

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks