General

  • Target

    c0cc50c884527db81553e24c3e2c8a288746aba2de5c608229f8915600635263

  • Size

    1.1MB

  • Sample

    221122-wn87esfg21

  • MD5

    021a13774b99f177e1d116f35d66d072

  • SHA1

    7e595ccf9a3065716fb6f823c671f5b02f51ec9f

  • SHA256

    c0cc50c884527db81553e24c3e2c8a288746aba2de5c608229f8915600635263

  • SHA512

    95740c50b706467585d1aac1d77cc4500b06ccb246ea70732832ac1b662f74f2c26b144ca31a7669274baa5cf86ec2be459be33292b046b93bca1bcf229f8d67

  • SSDEEP

    24576:i9tPcyQIwPactceMZ+uzHEtb4dVSI/xSEOTfVi:iHPcy3wPaWceMou7Et8VSI/U9di

Malware Config

Targets

    • Target

      c0cc50c884527db81553e24c3e2c8a288746aba2de5c608229f8915600635263

    • Size

      1.1MB

    • MD5

      021a13774b99f177e1d116f35d66d072

    • SHA1

      7e595ccf9a3065716fb6f823c671f5b02f51ec9f

    • SHA256

      c0cc50c884527db81553e24c3e2c8a288746aba2de5c608229f8915600635263

    • SHA512

      95740c50b706467585d1aac1d77cc4500b06ccb246ea70732832ac1b662f74f2c26b144ca31a7669274baa5cf86ec2be459be33292b046b93bca1bcf229f8d67

    • SSDEEP

      24576:i9tPcyQIwPactceMZ+uzHEtb4dVSI/xSEOTfVi:iHPcy3wPaWceMou7Et8VSI/U9di

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Modifies WinLogon for persistence

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks