General

  • Target

    71ce6e3e9dbb3fa520424f0a2df95f2c687b80bff196b14dde39d49a34f020ce

  • Size

    572KB

  • Sample

    221123-vdzdssgg39

  • MD5

    d35f5933085af5bc45eeec09a80ed7e3

  • SHA1

    e0fe666310036a88efdcdd1b2612d4fd82703d2d

  • SHA256

    71ce6e3e9dbb3fa520424f0a2df95f2c687b80bff196b14dde39d49a34f020ce

  • SHA512

    bd5ee3f370221ef4fb1512326d8fec70bc1011b1b3420474224e0cf61e6a137bf440b55ffb61c4474bdd5791d55ea3a788af2277a950380f5ebc503f8f09a50f

  • SSDEEP

    6144:IV02OnZ0DA+vjsdqBoOeQaHYcrfkDRv7Tr57gkcsG7mwsARpD7fu:2Y0DApklJacD9Takcs7wl8

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    general123

Targets

    • Target

      71ce6e3e9dbb3fa520424f0a2df95f2c687b80bff196b14dde39d49a34f020ce

    • Size

      572KB

    • MD5

      d35f5933085af5bc45eeec09a80ed7e3

    • SHA1

      e0fe666310036a88efdcdd1b2612d4fd82703d2d

    • SHA256

      71ce6e3e9dbb3fa520424f0a2df95f2c687b80bff196b14dde39d49a34f020ce

    • SHA512

      bd5ee3f370221ef4fb1512326d8fec70bc1011b1b3420474224e0cf61e6a137bf440b55ffb61c4474bdd5791d55ea3a788af2277a950380f5ebc503f8f09a50f

    • SSDEEP

      6144:IV02OnZ0DA+vjsdqBoOeQaHYcrfkDRv7Tr57gkcsG7mwsARpD7fu:2Y0DApklJacD9Takcs7wl8

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks