General

  • Target

    163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47

  • Size

    848KB

  • Sample

    221128-xlfyjada41

  • MD5

    cbfd582303e7789614a33bc0319b18c5

  • SHA1

    358551dfb3258aa681e13954bd9049e6a52a262d

  • SHA256

    163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47

  • SHA512

    e678c609646d36fe8a0fda84751dfcfd1cf9c1b8dac1b4f59e076d0ee9368cc71a27a81a3642e2b4ea0bb3565b5cbd7180e22eb2452dbd4898a9d83817bca527

  • SSDEEP

    24576:nMLqTK9fORLgS1/VigMFkn1CcRaWAibD:mqTK4yS1ggMFknI5W/f

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Jesusbuezeh

Targets

    • Target

      163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47

    • Size

      848KB

    • MD5

      cbfd582303e7789614a33bc0319b18c5

    • SHA1

      358551dfb3258aa681e13954bd9049e6a52a262d

    • SHA256

      163072595aef49197697d5bde6b1f4ead2d028a75bb28f04fda94510517bac47

    • SHA512

      e678c609646d36fe8a0fda84751dfcfd1cf9c1b8dac1b4f59e076d0ee9368cc71a27a81a3642e2b4ea0bb3565b5cbd7180e22eb2452dbd4898a9d83817bca527

    • SSDEEP

      24576:nMLqTK9fORLgS1/VigMFkn1CcRaWAibD:mqTK4yS1ggMFknI5W/f

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks