General

  • Target

    be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19

  • Size

    573KB

  • Sample

    221123-xbfj1she2t

  • MD5

    e3f00a3c7e9f820c201fac1277374f88

  • SHA1

    c55dec588d62c1178014f1e32819ea03d82217a2

  • SHA256

    be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19

  • SHA512

    7aea422b59f6006bbdeda5cf09aa3266d7b42cadc37273da04d286c8d643226af838a7d86ba02adb8c72eb6dd5d94dea6737d96f824e6b905800b45768466478

  • SSDEEP

    6144:ar02OnZ0DAkTZ37sGCCeNknpDYNNQelGnFxbLDryboYd8BTi8voVO+Z:cY0DAkTZwGCCq8IEnjbvEryBTgk+

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    poczta.interia.pl
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    qwerty123

Targets

    • Target

      be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19

    • Size

      573KB

    • MD5

      e3f00a3c7e9f820c201fac1277374f88

    • SHA1

      c55dec588d62c1178014f1e32819ea03d82217a2

    • SHA256

      be8a1fc09640d0b4dee349ce7bd2ef8466276512c11806832d09e95009c26d19

    • SHA512

      7aea422b59f6006bbdeda5cf09aa3266d7b42cadc37273da04d286c8d643226af838a7d86ba02adb8c72eb6dd5d94dea6737d96f824e6b905800b45768466478

    • SSDEEP

      6144:ar02OnZ0DAkTZ37sGCCeNknpDYNNQelGnFxbLDryboYd8BTi8voVO+Z:cY0DAkTZwGCCq8IEnjbvEryBTgk+

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks