General

  • Target

    6d315a33858604847bc262a3eb6344d99118440d19af5be32f99019fad0bf1cb

  • Size

    782KB

  • Sample

    221128-gxaynafe9z

  • MD5

    69515716d27b7cff70cd274864d14d33

  • SHA1

    cf4ee07235a338a542688478c467d9c178f34f0d

  • SHA256

    6d315a33858604847bc262a3eb6344d99118440d19af5be32f99019fad0bf1cb

  • SHA512

    3cf80e8b91c774a82d347285c481932380a41bef847126e6b134cd9e6118e19599b20e15aea4c0786edec6494f82ca9108823d2511ed084f989c96796f444d18

  • SSDEEP

    24576:cfW8WXuORu7DFdN2IuHUoNXM5DmuORmDdoKh5zrHG:cXbDVop+fR3G

Malware Config

Targets

    • Target

      6d315a33858604847bc262a3eb6344d99118440d19af5be32f99019fad0bf1cb

    • Size

      782KB

    • MD5

      69515716d27b7cff70cd274864d14d33

    • SHA1

      cf4ee07235a338a542688478c467d9c178f34f0d

    • SHA256

      6d315a33858604847bc262a3eb6344d99118440d19af5be32f99019fad0bf1cb

    • SHA512

      3cf80e8b91c774a82d347285c481932380a41bef847126e6b134cd9e6118e19599b20e15aea4c0786edec6494f82ca9108823d2511ed084f989c96796f444d18

    • SSDEEP

      24576:cfW8WXuORu7DFdN2IuHUoNXM5DmuORmDdoKh5zrHG:cXbDVop+fR3G

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks