General

  • Target

    4bea978951b9452de6ebbce207371089

  • Size

    775KB

  • Sample

    240108-tzpaaadeej

  • MD5

    4bea978951b9452de6ebbce207371089

  • SHA1

    558728ffa36f6c6fa0bebd6b5f9ec544a413fef7

  • SHA256

    ac0aa1fc56d492e81b4a71a9ab06fe35df42c8dd6fcccafa51591fa185d42927

  • SHA512

    9a66973759ea7689ee0b8979c6e34fdab96681ccf0cb2ab9697ef89e274a42067ee1436d5a6c29da9f3f2a76466f7821d1f5fd9c9cba095fada19c0cb89b8216

  • SSDEEP

    24576:/rl6kD68JmloLQf9MoraVGsEAGV1T+EI0Fsqy:Dl328U2kf9MorarUrLI06

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    zxcvbn@123

Targets

    • Target

      4bea978951b9452de6ebbce207371089

    • Size

      775KB

    • MD5

      4bea978951b9452de6ebbce207371089

    • SHA1

      558728ffa36f6c6fa0bebd6b5f9ec544a413fef7

    • SHA256

      ac0aa1fc56d492e81b4a71a9ab06fe35df42c8dd6fcccafa51591fa185d42927

    • SHA512

      9a66973759ea7689ee0b8979c6e34fdab96681ccf0cb2ab9697ef89e274a42067ee1436d5a6c29da9f3f2a76466f7821d1f5fd9c9cba095fada19c0cb89b8216

    • SSDEEP

      24576:/rl6kD68JmloLQf9MoraVGsEAGV1T+EI0Fsqy:Dl328U2kf9MorarUrLI06

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks