General

  • Target

    89a2faf1b65c932e10abea98097d72963708947d67dbf33324ba88a55c5e04e6

  • Size

    447KB

  • Sample

    221122-w4x44agd3s

  • MD5

    ddc2fdb455f2a23536aaacfab77af4b6

  • SHA1

    a2b804041521b22dc107a22f64a09afb9f609973

  • SHA256

    89a2faf1b65c932e10abea98097d72963708947d67dbf33324ba88a55c5e04e6

  • SHA512

    8efbb24330973d7e270fd20a033c697a95b536fabd4e5aa2ce7224594916f923ff2a0647e9511dc391fa03a44f443b0eff575822b5afa43ffe3f73168dd655f5

  • SSDEEP

    12288:SEGuxoIOcHBkiCVt2Y8cz+PAZa8YuINE:uubduiS7z+YaZJ

Malware Config

Targets

    • Target

      89a2faf1b65c932e10abea98097d72963708947d67dbf33324ba88a55c5e04e6

    • Size

      447KB

    • MD5

      ddc2fdb455f2a23536aaacfab77af4b6

    • SHA1

      a2b804041521b22dc107a22f64a09afb9f609973

    • SHA256

      89a2faf1b65c932e10abea98097d72963708947d67dbf33324ba88a55c5e04e6

    • SHA512

      8efbb24330973d7e270fd20a033c697a95b536fabd4e5aa2ce7224594916f923ff2a0647e9511dc391fa03a44f443b0eff575822b5afa43ffe3f73168dd655f5

    • SSDEEP

      12288:SEGuxoIOcHBkiCVt2Y8cz+PAZa8YuINE:uubduiS7z+YaZJ

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks