General

  • Target

    332476d704db55515efcc9674acac4d4fa3bec93cbc4919358f3b03f5fc18545

  • Size

    1.3MB

  • Sample

    221127-tv5fpsbd43

  • MD5

    0418695704a94c3d7ec5d14fffbf7629

  • SHA1

    ce88853efe4db8558c9609315cefbe9cdd746262

  • SHA256

    332476d704db55515efcc9674acac4d4fa3bec93cbc4919358f3b03f5fc18545

  • SHA512

    3e91cb824ac456c2ffbd43710380c4497de9cd1d773e39b6d693a83c4741c0c671ef5c2f62585a7d5212522f9f1f38d5e62049b2cdea935dbe2cec1f2f8096b2

  • SSDEEP

    24576:hnZ+XhRUERxlmt/+HQ2gt6PUj2y2n4e7GIkSmq:hnZmhRUET0QQ2gY74e7Tfmq

Malware Config

Targets

    • Target

      332476d704db55515efcc9674acac4d4fa3bec93cbc4919358f3b03f5fc18545

    • Size

      1.3MB

    • MD5

      0418695704a94c3d7ec5d14fffbf7629

    • SHA1

      ce88853efe4db8558c9609315cefbe9cdd746262

    • SHA256

      332476d704db55515efcc9674acac4d4fa3bec93cbc4919358f3b03f5fc18545

    • SHA512

      3e91cb824ac456c2ffbd43710380c4497de9cd1d773e39b6d693a83c4741c0c671ef5c2f62585a7d5212522f9f1f38d5e62049b2cdea935dbe2cec1f2f8096b2

    • SSDEEP

      24576:hnZ+XhRUERxlmt/+HQ2gt6PUj2y2n4e7GIkSmq:hnZmhRUET0QQ2gY74e7Tfmq

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks