General

  • Target

    11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233

  • Size

    1.4MB

  • Sample

    221128-g94rhacd64

  • MD5

    eefdc3d8d051270b7b1ff4d98ce61422

  • SHA1

    20bdb8aa5899a34e6430ef62ad73251b577dc4e0

  • SHA256

    11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233

  • SHA512

    24aeb92ba0c3c2cea80abb9a521a89d6c029499877927e81c1c8619b6698a602ec1da89bcfacf21d930d84dc728f746e8d8141092ea78ac70b4aa51b37a0297d

  • SSDEEP

    24576:UoxZaQ2/pC+MoEbA6lm4rQl/ipzrrxoceVwaOW0rs0Lqs96e+ZHOt:UrNhC+MFrm9l/UXFle5ODrskoe+0t

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.ru
  • Port:
    587
  • Username:
    ubahaman1@mail.ru
  • Password:
    limited1

Targets

    • Target

      11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233

    • Size

      1.4MB

    • MD5

      eefdc3d8d051270b7b1ff4d98ce61422

    • SHA1

      20bdb8aa5899a34e6430ef62ad73251b577dc4e0

    • SHA256

      11c549bf477589051ea2dc00058bbec761b21df16b4ece52255f6b567ca72233

    • SHA512

      24aeb92ba0c3c2cea80abb9a521a89d6c029499877927e81c1c8619b6698a602ec1da89bcfacf21d930d84dc728f746e8d8141092ea78ac70b4aa51b37a0297d

    • SSDEEP

      24576:UoxZaQ2/pC+MoEbA6lm4rQl/ipzrrxoceVwaOW0rs0Lqs96e+ZHOt:UrNhC+MFrm9l/UXFle5ODrskoe+0t

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks