General

  • Target

    bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934

  • Size

    663KB

  • Sample

    221123-thjngaeb49

  • MD5

    6b44529aac09330b1516899cc4010680

  • SHA1

    1fd8a3277ff6ed227e6523e2f21f6d1e426656b6

  • SHA256

    bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934

  • SHA512

    fb82652a9115d9b6906a4578ea88485d690c40eb403856db5525529a3bd3661f895d1b710b85413d000a5e3a0ce4274ce80f631f0300cedc5dd9f279d59ef9a6

  • SSDEEP

    12288:tm5wt9Y6zFxVngi8hRDK6YevoXSG8iG9a+rZeUbCq:jtJpLngik9aYeUbCq

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mynameiswhat

Targets

    • Target

      bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934

    • Size

      663KB

    • MD5

      6b44529aac09330b1516899cc4010680

    • SHA1

      1fd8a3277ff6ed227e6523e2f21f6d1e426656b6

    • SHA256

      bc6352461c3a2d49b4a9a8405dd71086e0e22c49144e948117c6ef32949d5934

    • SHA512

      fb82652a9115d9b6906a4578ea88485d690c40eb403856db5525529a3bd3661f895d1b710b85413d000a5e3a0ce4274ce80f631f0300cedc5dd9f279d59ef9a6

    • SSDEEP

      12288:tm5wt9Y6zFxVngi8hRDK6YevoXSG8iG9a+rZeUbCq:jtJpLngik9aYeUbCq

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks