General

  • Target

    ac264beeee7dacdfbf13d69e27aa28dd80a788631691c15701627fe065de58be

  • Size

    678KB

  • Sample

    221123-qnxkqsed94

  • MD5

    19f021dafe19fecaa33c20ead99b69fe

  • SHA1

    09065b86b5f3066abc66de863950f1711108f067

  • SHA256

    ac264beeee7dacdfbf13d69e27aa28dd80a788631691c15701627fe065de58be

  • SHA512

    85ca1b2484991872c1f4c9d0f3ed8dca0f5019331057ba15063f06be3e91af553bacbac3525bfa21ce7188a92d8d69c6104d44a892bea65888e3cabfb56a1f52

  • SSDEEP

    12288:uu49EY7AmXkI10zsbyt5x+LE0QzaaGvm2V82FQpzBhSD8sBfZ0X3:uN2YwIsx+LFauV8TzBhSQsBmX

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    ncalginzyytkaawa

Targets

    • Target

      ac264beeee7dacdfbf13d69e27aa28dd80a788631691c15701627fe065de58be

    • Size

      678KB

    • MD5

      19f021dafe19fecaa33c20ead99b69fe

    • SHA1

      09065b86b5f3066abc66de863950f1711108f067

    • SHA256

      ac264beeee7dacdfbf13d69e27aa28dd80a788631691c15701627fe065de58be

    • SHA512

      85ca1b2484991872c1f4c9d0f3ed8dca0f5019331057ba15063f06be3e91af553bacbac3525bfa21ce7188a92d8d69c6104d44a892bea65888e3cabfb56a1f52

    • SSDEEP

      12288:uu49EY7AmXkI10zsbyt5x+LE0QzaaGvm2V82FQpzBhSD8sBfZ0X3:uN2YwIsx+LFauV8TzBhSQsBmX

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks