General

  • Target

    81005dca07780ca4a3cec3e39f81911f0d67b6906e59e1fd271d70de55a67905

  • Size

    1.7MB

  • Sample

    221126-a48pyaad34

  • MD5

    916535f6de7ee9f37301730c761561f8

  • SHA1

    e32462038045837ab5a6c96809fc75e6c3ad136d

  • SHA256

    81005dca07780ca4a3cec3e39f81911f0d67b6906e59e1fd271d70de55a67905

  • SHA512

    86774f165ff350e7ed2e9ec95b2e4bd7b3d19e3d8ca6337fd6fd662fd9ec0280fe49fe290e17858c2be01cefbd30dbe10cf511218a53aa36105bf5fa59dfebe1

  • SSDEEP

    24576:f2O/GluC7Y7vIBRZzFV/yaF8YXOmD69kgp/U8wd9E6/udcLEN+xY7g6zwm4m53Sj:HAY7wh7mYeDp/Ui6zEN+i5kFm53SyqP5

Malware Config

Targets

    • Target

      81005dca07780ca4a3cec3e39f81911f0d67b6906e59e1fd271d70de55a67905

    • Size

      1.7MB

    • MD5

      916535f6de7ee9f37301730c761561f8

    • SHA1

      e32462038045837ab5a6c96809fc75e6c3ad136d

    • SHA256

      81005dca07780ca4a3cec3e39f81911f0d67b6906e59e1fd271d70de55a67905

    • SHA512

      86774f165ff350e7ed2e9ec95b2e4bd7b3d19e3d8ca6337fd6fd662fd9ec0280fe49fe290e17858c2be01cefbd30dbe10cf511218a53aa36105bf5fa59dfebe1

    • SSDEEP

      24576:f2O/GluC7Y7vIBRZzFV/yaF8YXOmD69kgp/U8wd9E6/udcLEN+xY7g6zwm4m53Sj:HAY7wh7mYeDp/Ui6zEN+i5kFm53SyqP5

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks