General

  • Target

    POSAIFOODPVTLTD.exe

  • Size

    1.0MB

  • Sample

    240814-kgcn4axdmq

  • MD5

    dea59d578e0e64728780fb67dde7d96d

  • SHA1

    b23c86a74f5514ebcfb8e3f102a4b16f60ff4076

  • SHA256

    71dbb1177cb271ab30531fda54cad0f1ea8be87182f96bf21f37dcf65758f6ce

  • SHA512

    64663c97bcea47b6c265df2598e12b1dfeb437efc6e78a6a23cf0a02cfeaf28b054cc5af85b2d1aff3822c5d5b82905952db2722e095e138a0bf0203977d4bce

  • SSDEEP

    24576:xsep9+wg44M5eh0GGxlA2F4O41ub2z6X46qU8A/yHD5A1:eo9+wg44M5eoA2FGO2m4XU8A/yj5A1

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.comedyskits.com.ng
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    TGXs]#J&_ReU

Targets

    • Target

      POSAIFOODPVTLTD.exe

    • Size

      1.0MB

    • MD5

      dea59d578e0e64728780fb67dde7d96d

    • SHA1

      b23c86a74f5514ebcfb8e3f102a4b16f60ff4076

    • SHA256

      71dbb1177cb271ab30531fda54cad0f1ea8be87182f96bf21f37dcf65758f6ce

    • SHA512

      64663c97bcea47b6c265df2598e12b1dfeb437efc6e78a6a23cf0a02cfeaf28b054cc5af85b2d1aff3822c5d5b82905952db2722e095e138a0bf0203977d4bce

    • SSDEEP

      24576:xsep9+wg44M5eh0GGxlA2F4O41ub2z6X46qU8A/yHD5A1:eo9+wg44M5eoA2FGO2m4XU8A/yj5A1

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks