General

  • Target

    b3711e4c9c63295f5d11217445c0ca7b7958b15d77752339259a53a06c76f0c0

  • Size

    881KB

  • Sample

    221125-wb5ngada56

  • MD5

    d10307ab3006ed2b51c963d270fd7675

  • SHA1

    1c133497e039f1d8f9a614015e8c65106f255ac4

  • SHA256

    b3711e4c9c63295f5d11217445c0ca7b7958b15d77752339259a53a06c76f0c0

  • SHA512

    1fb759cae65d4e2ccf76e6eda0afdbfef031a481c1c0607011d79f6b92c038cceab20434a6957cf7e7a14f975665e925afd945c78de1812a37b4e403da911039

  • SSDEEP

    12288:kf0pGkyJAtfZYUENx+Uc6zGkS1ekrOo6T3ii/ncl/HmuYAsmCkZ+qfBxZQF:Blj8/+kTScXgmuamCkHfts

Malware Config

Targets

    • Target

      b3711e4c9c63295f5d11217445c0ca7b7958b15d77752339259a53a06c76f0c0

    • Size

      881KB

    • MD5

      d10307ab3006ed2b51c963d270fd7675

    • SHA1

      1c133497e039f1d8f9a614015e8c65106f255ac4

    • SHA256

      b3711e4c9c63295f5d11217445c0ca7b7958b15d77752339259a53a06c76f0c0

    • SHA512

      1fb759cae65d4e2ccf76e6eda0afdbfef031a481c1c0607011d79f6b92c038cceab20434a6957cf7e7a14f975665e925afd945c78de1812a37b4e403da911039

    • SSDEEP

      12288:kf0pGkyJAtfZYUENx+Uc6zGkS1ekrOo6T3ii/ncl/HmuYAsmCkZ+qfBxZQF:Blj8/+kTScXgmuamCkHfts

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Tasks