General

  • Target

    25f433acacb2543ed3dd61be818524088468451b96710ac9799200391f5d9f02

  • Size

    1.2MB

  • Sample

    221125-eajaeach6s

  • MD5

    728bcb795d2c5777577aa820cdfe9088

  • SHA1

    81b0fa677aa8975b56f02abd9cce56bd912fde51

  • SHA256

    25f433acacb2543ed3dd61be818524088468451b96710ac9799200391f5d9f02

  • SHA512

    c5da28ae275715a35d43b60a1596247edd567248c04c4e17ea885a51a549fc87f82af25debaf828610f2fc143bcd9d22259744f1b346b752d9bf8081bc212d2a

  • SSDEEP

    24576:404Yt75R+59L8vamkFE9rdmDkYOrxVBB29gsInQ8MBDlsl7gOHdx5V8:t4Y55A5x8vmC9rdmIjxjB2Mnwe5V8

Malware Config

Targets

    • Target

      25f433acacb2543ed3dd61be818524088468451b96710ac9799200391f5d9f02

    • Size

      1.2MB

    • MD5

      728bcb795d2c5777577aa820cdfe9088

    • SHA1

      81b0fa677aa8975b56f02abd9cce56bd912fde51

    • SHA256

      25f433acacb2543ed3dd61be818524088468451b96710ac9799200391f5d9f02

    • SHA512

      c5da28ae275715a35d43b60a1596247edd567248c04c4e17ea885a51a549fc87f82af25debaf828610f2fc143bcd9d22259744f1b346b752d9bf8081bc212d2a

    • SSDEEP

      24576:404Yt75R+59L8vamkFE9rdmDkYOrxVBB29gsInQ8MBDlsl7gOHdx5V8:t4Y55A5x8vmC9rdmIjxjB2Mnwe5V8

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks