General

  • Target

    aa9a39a40e8344b970428a20cd8860825364ccb0e88f410ebca127c1a0cbd419

  • Size

    813KB

  • Sample

    221003-cdhryachhq

  • MD5

    6cd920530b09541a42f1b1b40948a460

  • SHA1

    2a26a1a400d2472c743bfe7ed1b7afb902fed486

  • SHA256

    aa9a39a40e8344b970428a20cd8860825364ccb0e88f410ebca127c1a0cbd419

  • SHA512

    6746bf0d8461509253e8296fe626ac3701a98fd813cd61c2b5fe5fcbbac4871025682ce8109dbf06275624dcb9eba34ef76dd15c8fd39a3bc64c60261e48ad40

  • SSDEEP

    12288:QvRwqFq+PzD6Shp6/MVqZyiqsg0iR/Cs1q0vcSouox6UauGxO9v:6uqzD83Zyi1g06/5q+cNuoxX76O

Malware Config

Targets

    • Target

      aa9a39a40e8344b970428a20cd8860825364ccb0e88f410ebca127c1a0cbd419

    • Size

      813KB

    • MD5

      6cd920530b09541a42f1b1b40948a460

    • SHA1

      2a26a1a400d2472c743bfe7ed1b7afb902fed486

    • SHA256

      aa9a39a40e8344b970428a20cd8860825364ccb0e88f410ebca127c1a0cbd419

    • SHA512

      6746bf0d8461509253e8296fe626ac3701a98fd813cd61c2b5fe5fcbbac4871025682ce8109dbf06275624dcb9eba34ef76dd15c8fd39a3bc64c60261e48ad40

    • SSDEEP

      12288:QvRwqFq+PzD6Shp6/MVqZyiqsg0iR/Cs1q0vcSouox6UauGxO9v:6uqzD83Zyi1g06/5q+cNuoxX76O

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks