General

  • Target

    bfb3ba943d5333f18237ad7ae04a9601bbf677f0fcdebd45d788d86703ab8f70

  • Size

    532KB

  • Sample

    230129-j765ysgg9v

  • MD5

    4aa2148b49e9956201b00ab8c5914e09

  • SHA1

    3f430ee7d1742b76ea6676b8d1480bf0456635f3

  • SHA256

    bfb3ba943d5333f18237ad7ae04a9601bbf677f0fcdebd45d788d86703ab8f70

  • SHA512

    97da894d91f8216eb742cee8b46c2f4ab62d676ab6aff7d6bab22f6104e6b8cb5b6ce350f774ad688a5c951c103effc2f71a78998aebd3fca01037224d38ac0f

  • SSDEEP

    12288:vHbypKkBLIvL6omZrRgRlKnninnnnfNobnnnnuLeqLt:vbyowLIvL65ZriR4ninnfNknuLeqLt

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    k4ivitu@gmail.com
  • Password:
    Vajalik312

Targets

    • Target

      bfb3ba943d5333f18237ad7ae04a9601bbf677f0fcdebd45d788d86703ab8f70

    • Size

      532KB

    • MD5

      4aa2148b49e9956201b00ab8c5914e09

    • SHA1

      3f430ee7d1742b76ea6676b8d1480bf0456635f3

    • SHA256

      bfb3ba943d5333f18237ad7ae04a9601bbf677f0fcdebd45d788d86703ab8f70

    • SHA512

      97da894d91f8216eb742cee8b46c2f4ab62d676ab6aff7d6bab22f6104e6b8cb5b6ce350f774ad688a5c951c103effc2f71a78998aebd3fca01037224d38ac0f

    • SSDEEP

      12288:vHbypKkBLIvL6omZrRgRlKnninnnnfNobnnnnuLeqLt:vbyowLIvL65ZriR4ninnfNknuLeqLt

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Tasks