General

  • Target

    6ab07615a85e25ea9cf1213fcc0c55f7e93928b87b31399dfda4331ebdb205e6.zip

  • Size

    884KB

  • Sample

    240402-q7nryacc5t

  • MD5

    145e20f5960fcc1f156a76fda584f767

  • SHA1

    b2ceb53279ff0a03c72b851e31aaadc0aac0d1ab

  • SHA256

    b28d7c47415c9a51d1ce36eb1eaa7ccd629875a6f6928865ce4748b3bfa3ed59

  • SHA512

    f9f1ecff8b2ec07650a156e31875d853260182373ab5a8418dc15526a78a144dac03c9aa2e84a373a8416066d44a4d4393fba51dcb16878b8f984dfc741ccc9c

  • SSDEEP

    12288:94yckG58QD66ZZZLuGo7WJEsgGhVFeOeTAIjefLHpXZFaBuYMQPXml2SWQj4lJah:GsnadXLtVEsgGhv7zJXZkuYMWjfwq6L

Malware Config

Targets

    • Target

      LPO -Comfirmaton Order Pdf.exe

    • Size

      1.2MB

    • MD5

      81f9de1413f35585e3eda567859d6327

    • SHA1

      b033df120cb75bfbecfe0f5d75b6d3c74cf26bf7

    • SHA256

      7a30f11aee32cb6b96651c34349d1d290413c01e3c48e056bc833ca97856730c

    • SHA512

      67c1d3bf559752c2bf4b7f725008ebb47317143aa9ff5b7e288e7ee706d407de54dbc2c0bd8ef2933b0a8c8de61bc5c4b12316be913518264673e79863341c7a

    • SSDEEP

      24576:3UXKCz7PPJENPvGbYAgcGel2vZ400k+eq3iXWVhcK0C:3Yz7JE1vGbYA5zYvv0hc5C

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Looks for VirtualBox Guest Additions in registry

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Email Collection

1
T1114

Tasks