General

  • Target

    f19338d724c0e6b14325ce3b6d38d17dc60c7a70e8d460e2353bd624a16cf81f

  • Size

    540KB

  • Sample

    221127-ry56ashh4w

  • MD5

    c340b545e167371f71a21251f16980f7

  • SHA1

    546efcf9a52b1efa0351e71d1e17becfc6a08250

  • SHA256

    f19338d724c0e6b14325ce3b6d38d17dc60c7a70e8d460e2353bd624a16cf81f

  • SHA512

    314b30fe3068aaf54a6547f706508929ab91a008ac0a6fdc5443b63b7848007538ea14a7b24185c436182af5a32aa32681b681c3ac5492035fef3120f742139e

  • SSDEEP

    6144:ku9GDrsbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9DK:zQtqB5urTIoYWBQk1E+VF9mOx9Dw3

Malware Config

Targets

    • Target

      f19338d724c0e6b14325ce3b6d38d17dc60c7a70e8d460e2353bd624a16cf81f

    • Size

      540KB

    • MD5

      c340b545e167371f71a21251f16980f7

    • SHA1

      546efcf9a52b1efa0351e71d1e17becfc6a08250

    • SHA256

      f19338d724c0e6b14325ce3b6d38d17dc60c7a70e8d460e2353bd624a16cf81f

    • SHA512

      314b30fe3068aaf54a6547f706508929ab91a008ac0a6fdc5443b63b7848007538ea14a7b24185c436182af5a32aa32681b681c3ac5492035fef3120f742139e

    • SSDEEP

      6144:ku9GDrsbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9DK:zQtqB5urTIoYWBQk1E+VF9mOx9Dw3

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks