General

  • Target

    PO Lists --- pdf.exe

  • Size

    1.2MB

  • Sample

    230519-lketasdb44

  • MD5

    eea1fbd22436e2b085fa5fcc55ea052e

  • SHA1

    76f7c18a39a48b86dda253eaa146fd6e1aa5df89

  • SHA256

    43e66c483be9cbb9f35ce7f57bf255925abd25a8fc40b80d79bf0cd2a3f54af9

  • SHA512

    3f9d3756e4e5f0bc1841a3fbfffd12fdd52708bb97db36b01dbb96b34946944e42297d9eb6e871f4ba5d653771118035eb7fc88f948e806911916409fc1bbdbe

  • SSDEEP

    24576:/j0pZcKDySR/Pxt8eD8dSevyifwZpNZ0C:L0zOu/JtR8HvyuSeC

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.lucd.ru
  • Port:
    21
  • Username:
    hwk@lucd.ru
  • Password:
    obum@911

Targets

    • Target

      PO Lists --- pdf.exe

    • Size

      1.2MB

    • MD5

      eea1fbd22436e2b085fa5fcc55ea052e

    • SHA1

      76f7c18a39a48b86dda253eaa146fd6e1aa5df89

    • SHA256

      43e66c483be9cbb9f35ce7f57bf255925abd25a8fc40b80d79bf0cd2a3f54af9

    • SHA512

      3f9d3756e4e5f0bc1841a3fbfffd12fdd52708bb97db36b01dbb96b34946944e42297d9eb6e871f4ba5d653771118035eb7fc88f948e806911916409fc1bbdbe

    • SSDEEP

      24576:/j0pZcKDySR/Pxt8eD8dSevyifwZpNZ0C:L0zOu/JtR8HvyuSeC

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Looks for VirtualBox Guest Additions in registry

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Email Collection

1
T1114

Tasks