General

  • Target

    7a30f11aee32cb6b96651c34349d1d290413c01e3c48e056bc833ca97856730c.zip

  • Size

    885KB

  • Sample

    240402-q7pdgacd97

  • MD5

    b5e181f93b1542a54b08197ba014a957

  • SHA1

    e1604ea72accf5db73a97b770d8fde1a87b915b3

  • SHA256

    3db82175ec1a2610247e858b68b0677fba2e08e265544a818880cb075d6692cf

  • SHA512

    2e5f0b2a2a8bb763c8e2856aa39087e15076c5887a1c1600749b5013a14a56952f4f92fff79101029c1f126327f214d72efeec5adb94a6f999b8802e027fee8d

  • SSDEEP

    24576:LxnqVXShSIzSx3UYa8bugR1U9C3yEGYwJf9Q7OaKeIYiy:LRqNFhaiJTiNYuUOaKlYiy

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.lucd.ru
  • Port:
    21
  • Username:
    hwk@lucd.ru
  • Password:
    obum@911

Targets

    • Target

      7a30f11aee32cb6b96651c34349d1d290413c01e3c48e056bc833ca97856730c.exe

    • Size

      1.2MB

    • MD5

      81f9de1413f35585e3eda567859d6327

    • SHA1

      b033df120cb75bfbecfe0f5d75b6d3c74cf26bf7

    • SHA256

      7a30f11aee32cb6b96651c34349d1d290413c01e3c48e056bc833ca97856730c

    • SHA512

      67c1d3bf559752c2bf4b7f725008ebb47317143aa9ff5b7e288e7ee706d407de54dbc2c0bd8ef2933b0a8c8de61bc5c4b12316be913518264673e79863341c7a

    • SSDEEP

      24576:3UXKCz7PPJENPvGbYAgcGel2vZ400k+eq3iXWVhcK0C:3Yz7JE1vGbYA5zYvv0hc5C

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Looks for VirtualBox Guest Additions in registry

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Collection

Email Collection

1
T1114

Tasks