General

  • Target

    53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2

  • Size

    445KB

  • Sample

    221127-km1ccagh4v

  • MD5

    46188804e5e27e33dc013211b9f285dd

  • SHA1

    04639d4398385f9e9621eb1e764b5516a401302c

  • SHA256

    53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2

  • SHA512

    7fd50e3c07240518189d34c74c9ed06b078ef421500d3b310678254aaaec077c3268796e3988407929feab8b1e010e688b625480a9442d9501f74497d7f44af5

  • SSDEEP

    6144:U9lZdcXl0nwu76hqQN97gtpfSy5HzLnjXRcp1kshRNvaJ0OiGRTJLeRkxnb:+O0wi6JN1wfl5TLTRcjksMliGNReRkt

Malware Config

Targets

    • Target

      53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2

    • Size

      445KB

    • MD5

      46188804e5e27e33dc013211b9f285dd

    • SHA1

      04639d4398385f9e9621eb1e764b5516a401302c

    • SHA256

      53bdca1cdd8109b86013d4e27639f3e5590a42bdae359337a51260e3fdd4c7a2

    • SHA512

      7fd50e3c07240518189d34c74c9ed06b078ef421500d3b310678254aaaec077c3268796e3988407929feab8b1e010e688b625480a9442d9501f74497d7f44af5

    • SSDEEP

      6144:U9lZdcXl0nwu76hqQN97gtpfSy5HzLnjXRcp1kshRNvaJ0OiGRTJLeRkxnb:+O0wi6JN1wfl5TLTRcjksMliGNReRkt

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks