General

  • Target

    46409f5fda712ba774daaddb2f052d10c9632f132a1c6251af4dcec18c33b64c

  • Size

    1.5MB

  • Sample

    221127-tm4t7sag36

  • MD5

    bd78cc1ef2031d1fee98b0fdda4df119

  • SHA1

    4a11d7e95b39192727d53626660d9ccffe647f91

  • SHA256

    46409f5fda712ba774daaddb2f052d10c9632f132a1c6251af4dcec18c33b64c

  • SHA512

    b4709db2d342a95d374bccf9e319ce2e365fe922246a7cf4613c82d27721e8ae6ae038d373c7e0979acda47b0038817a89af78293b52dfb0432f402ce2039921

  • SSDEEP

    24576:piA1se/vFeAgAI/y8YsAm85tKgB68IU86OpjY3g2+rKQfzFsFfknVPpeEtjYF+SN:p1/vFxI/cw8P1sjfHrHzFLj0

Malware Config

Targets

    • Target

      46409f5fda712ba774daaddb2f052d10c9632f132a1c6251af4dcec18c33b64c

    • Size

      1.5MB

    • MD5

      bd78cc1ef2031d1fee98b0fdda4df119

    • SHA1

      4a11d7e95b39192727d53626660d9ccffe647f91

    • SHA256

      46409f5fda712ba774daaddb2f052d10c9632f132a1c6251af4dcec18c33b64c

    • SHA512

      b4709db2d342a95d374bccf9e319ce2e365fe922246a7cf4613c82d27721e8ae6ae038d373c7e0979acda47b0038817a89af78293b52dfb0432f402ce2039921

    • SSDEEP

      24576:piA1se/vFeAgAI/y8YsAm85tKgB68IU86OpjY3g2+rKQfzFsFfknVPpeEtjYF+SN:p1/vFxI/cw8P1sjfHrHzFLj0

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks