General

  • Target

    2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc

  • Size

    611KB

  • Sample

    221125-dv4leagf78

  • MD5

    a0716591cb79d1c96d07bf5530d29d1f

  • SHA1

    ca0fbb0bd53ebdc0631746c4573efe13b8e6e3f9

  • SHA256

    2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc

  • SHA512

    70c8087ca945d5397cb32d900b2ebbb13f9597eb4fd1fdf56e7e641b89a99abc5c62a300445c4c2cc93fec0094fa3e074137dff1d45b2f8b3458b8494f95e5cf

  • SSDEEP

    12288:mEfAqgMDfdo1mblW2aZAfBCAVs1qW1C0ktajPnGshbn6Pu:mEtDflWofoAC1qW3Ny

Malware Config

Targets

    • Target

      2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc

    • Size

      611KB

    • MD5

      a0716591cb79d1c96d07bf5530d29d1f

    • SHA1

      ca0fbb0bd53ebdc0631746c4573efe13b8e6e3f9

    • SHA256

      2da8bd2a6f495ac8a693f9309803ba4a0aecf92524a259d2ccc5da347a35f9bc

    • SHA512

      70c8087ca945d5397cb32d900b2ebbb13f9597eb4fd1fdf56e7e641b89a99abc5c62a300445c4c2cc93fec0094fa3e074137dff1d45b2f8b3458b8494f95e5cf

    • SSDEEP

      12288:mEfAqgMDfdo1mblW2aZAfBCAVs1qW1C0ktajPnGshbn6Pu:mEtDflWofoAC1qW3Ny

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks