General

  • Target

    aed3296d4bd0828b1212a9e8709901312f456be380ab9054d10110b0475af648

  • Size

    450KB

  • Sample

    221124-aezqqsec36

  • MD5

    ccc806ad6aea5c93e8f235a43f2c514c

  • SHA1

    1623d1f14d9c38d55b7b911d79b21ac8ab398258

  • SHA256

    aed3296d4bd0828b1212a9e8709901312f456be380ab9054d10110b0475af648

  • SHA512

    faa3333a5aaca8152d64831993b46aa30741fc4f2980647d4cbfc6462c44e0490acfc5a96ca92e19f13f9340b020bc1797fb6cdb8c08448c9c4cae65d8a5afd6

  • SSDEEP

    12288:maob+xukglukgvj3tZzDeCOQhskVYe6mo:Y+xZglukw3tdx3VYmo

Malware Config

Targets

    • Target

      aed3296d4bd0828b1212a9e8709901312f456be380ab9054d10110b0475af648

    • Size

      450KB

    • MD5

      ccc806ad6aea5c93e8f235a43f2c514c

    • SHA1

      1623d1f14d9c38d55b7b911d79b21ac8ab398258

    • SHA256

      aed3296d4bd0828b1212a9e8709901312f456be380ab9054d10110b0475af648

    • SHA512

      faa3333a5aaca8152d64831993b46aa30741fc4f2980647d4cbfc6462c44e0490acfc5a96ca92e19f13f9340b020bc1797fb6cdb8c08448c9c4cae65d8a5afd6

    • SSDEEP

      12288:maob+xukglukgvj3tZzDeCOQhskVYe6mo:Y+xZglukw3tdx3VYmo

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks