General

  • Target

    34af6025848f06edccbbedd2d9ab61e7cb3c2d03b945cf1f63300abd5c1879ee

  • Size

    679KB

  • Sample

    221128-mg91psfe58

  • MD5

    6ec60f37d746ff3cc4e07bbc22f64992

  • SHA1

    5b4fdb323d57e8041957aa5bdbb9be6277ba09aa

  • SHA256

    34af6025848f06edccbbedd2d9ab61e7cb3c2d03b945cf1f63300abd5c1879ee

  • SHA512

    91981d858d10fa090f76099b327477ca7fb9d589f121ef23417d96b38cd4970033fc42e1725574e0ad205d2a57b1c016b3ad37210b3635160efcb6adb54f7375

  • SSDEEP

    12288:iRBr52LvaGtEuWGC9hy8DCiPrtNg8mMujqBJvrOjaHpzXdDJ0UjtlaxzyDbvr/XR:iRwvBSuROyCC0rtq8mmH/bYenr/X7z5v

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    doggy.k@yandex.com
  • Password:
    kingsdoggy

Targets

    • Target

      34af6025848f06edccbbedd2d9ab61e7cb3c2d03b945cf1f63300abd5c1879ee

    • Size

      679KB

    • MD5

      6ec60f37d746ff3cc4e07bbc22f64992

    • SHA1

      5b4fdb323d57e8041957aa5bdbb9be6277ba09aa

    • SHA256

      34af6025848f06edccbbedd2d9ab61e7cb3c2d03b945cf1f63300abd5c1879ee

    • SHA512

      91981d858d10fa090f76099b327477ca7fb9d589f121ef23417d96b38cd4970033fc42e1725574e0ad205d2a57b1c016b3ad37210b3635160efcb6adb54f7375

    • SSDEEP

      12288:iRBr52LvaGtEuWGC9hy8DCiPrtNg8mMujqBJvrOjaHpzXdDJ0UjtlaxzyDbvr/XR:iRwvBSuROyCC0rtq8mmH/bYenr/X7z5v

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Email Collection

1
T1114

Tasks