General

  • Target

    1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc

  • Size

    818KB

  • Sample

    221130-v334aadf6z

  • MD5

    370d9823164b3e2d07447851db75c80d

  • SHA1

    30a9b34ae7600c776326a413823983c6d28d3e27

  • SHA256

    1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc

  • SHA512

    278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db

  • SSDEEP

    12288:PARn9Ur93VDNqvaHg8IeRfTcdhP2FQHw5Nh4/AioaioBiVO7zW:W9i93DxCeRAdhPup/43JzW

Malware Config

Targets

    • Target

      1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc

    • Size

      818KB

    • MD5

      370d9823164b3e2d07447851db75c80d

    • SHA1

      30a9b34ae7600c776326a413823983c6d28d3e27

    • SHA256

      1aef44002f72885fbdb2c2d3b1c9b872fe9435d904d3411e90bc14291fdc2cdc

    • SHA512

      278dcc98b3a0f7990cffc12d83bd63b0a27911356cc61f91481998afb422a0a60bf0f86bf0f89529687311862d99fc704448bea91c41ab2e4979d3c4f35007db

    • SSDEEP

      12288:PARn9Ur93VDNqvaHg8IeRfTcdhP2FQHw5Nh4/AioaioBiVO7zW:W9i93DxCeRAdhPup/43JzW

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks