General

  • Target

    484764279ea3b54b8480cb6c458de66d670a1742b72b30eca65e9881959228e6

  • Size

    939KB

  • Sample

    221128-k7j6vsca55

  • MD5

    2f561c6c72a26b84810af371b51018f3

  • SHA1

    36ebdc8dbce73e2e751d639dd91ca78739b31ac5

  • SHA256

    484764279ea3b54b8480cb6c458de66d670a1742b72b30eca65e9881959228e6

  • SHA512

    b6c60c2b8388687ce9d2869f53c8f9cb28d9814bb3048423a63fa6ef712c5da8a7a9567bad5a754d13d38bb87746ce9b8fe935561c2451daeae32eb9ca38d974

  • SSDEEP

    24576:wkl2FbNWek29p1Q0oXHY4geMVxYEOdHQhioL3JPBRQ:Ll2FhHlGRM34SB7

Malware Config

Targets

    • Target

      484764279ea3b54b8480cb6c458de66d670a1742b72b30eca65e9881959228e6

    • Size

      939KB

    • MD5

      2f561c6c72a26b84810af371b51018f3

    • SHA1

      36ebdc8dbce73e2e751d639dd91ca78739b31ac5

    • SHA256

      484764279ea3b54b8480cb6c458de66d670a1742b72b30eca65e9881959228e6

    • SHA512

      b6c60c2b8388687ce9d2869f53c8f9cb28d9814bb3048423a63fa6ef712c5da8a7a9567bad5a754d13d38bb87746ce9b8fe935561c2451daeae32eb9ca38d974

    • SSDEEP

      24576:wkl2FbNWek29p1Q0oXHY4geMVxYEOdHQhioL3JPBRQ:Ll2FhHlGRM34SB7

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Modifies WinLogon for persistence

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks