General

  • Target

    0d786aaf0fc907ff63fda72fff4416aa9dd202f7cff08594edcdf6cecffd1e1f

  • Size

    679KB

  • Sample

    221123-scv9msba56

  • MD5

    0e9de38973a7a5be13c1c95f9d843bdb

  • SHA1

    43205f13888005f23bd3fd96fff710de1ea78820

  • SHA256

    0d786aaf0fc907ff63fda72fff4416aa9dd202f7cff08594edcdf6cecffd1e1f

  • SHA512

    71f74c564b50f9ad3ecf948aa4c6cfdb40a0f082134839726b57bb5b9fc6ae0a1f5b569c53eaa4b8b69d1192edb3945b47b9dfb8d73e4f0e8b379cdf5955ac1a

  • SSDEEP

    12288:1q0j0BEkr1veUfXYRQJtbUMdkRY3NyW/0C8/Vpv3Y9Ah4RRZ0D:rmEWvYRMSM+R0/0n9xY9Ah4RY

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    noohkxueuadadesg

Targets

    • Target

      0d786aaf0fc907ff63fda72fff4416aa9dd202f7cff08594edcdf6cecffd1e1f

    • Size

      679KB

    • MD5

      0e9de38973a7a5be13c1c95f9d843bdb

    • SHA1

      43205f13888005f23bd3fd96fff710de1ea78820

    • SHA256

      0d786aaf0fc907ff63fda72fff4416aa9dd202f7cff08594edcdf6cecffd1e1f

    • SHA512

      71f74c564b50f9ad3ecf948aa4c6cfdb40a0f082134839726b57bb5b9fc6ae0a1f5b569c53eaa4b8b69d1192edb3945b47b9dfb8d73e4f0e8b379cdf5955ac1a

    • SSDEEP

      12288:1q0j0BEkr1veUfXYRQJtbUMdkRY3NyW/0C8/Vpv3Y9Ah4RRZ0D:rmEWvYRMSM+R0/0n9xY9Ah4RY

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks