General

  • Target

    d6ff8416aacfd50b3b4c90136d745127d03434a591c56dc18e2fb341ef43243a

  • Size

    1.4MB

  • Sample

    221127-mpcp6see4t

  • MD5

    db6c17ea0f62f8899ba154ead5171c0c

  • SHA1

    4908b50c88de84e66daef1900fcc1a06d9847283

  • SHA256

    d6ff8416aacfd50b3b4c90136d745127d03434a591c56dc18e2fb341ef43243a

  • SHA512

    bdf89e1de74ab59c22bd0756142216f4539782cb7febf99a0e0367935135b7de115a3199ab5fdc47b48e2426bf1f1256520d4c92795aac7b3acec028db492b80

  • SSDEEP

    12288:/3MNPsHfoxY5JBNVQ6QL5fDgA1FsHFGjzSU7ucK0rxEwYN6u04XX4ZSBrOZzsmUb:gPkPvS3uGkQxEwYzTVFsfyU97GYxUkg

Malware Config

Targets

    • Target

      d6ff8416aacfd50b3b4c90136d745127d03434a591c56dc18e2fb341ef43243a

    • Size

      1.4MB

    • MD5

      db6c17ea0f62f8899ba154ead5171c0c

    • SHA1

      4908b50c88de84e66daef1900fcc1a06d9847283

    • SHA256

      d6ff8416aacfd50b3b4c90136d745127d03434a591c56dc18e2fb341ef43243a

    • SHA512

      bdf89e1de74ab59c22bd0756142216f4539782cb7febf99a0e0367935135b7de115a3199ab5fdc47b48e2426bf1f1256520d4c92795aac7b3acec028db492b80

    • SSDEEP

      12288:/3MNPsHfoxY5JBNVQ6QL5fDgA1FsHFGjzSU7ucK0rxEwYN6u04XX4ZSBrOZzsmUb:gPkPvS3uGkQxEwYzTVFsfyU97GYxUkg

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks