General

  • Target

    a255f84c37ae5dfa20453a9dafdc540f8bde56059e630399ce4bc5c1502a5296

  • Size

    753KB

  • Sample

    240926-y8lmzazake

  • MD5

    881e968ddf34c38943a56651a3870174

  • SHA1

    e53ce4b02ba94d3dbc36c09b4e6ae6bfa8960bf6

  • SHA256

    a255f84c37ae5dfa20453a9dafdc540f8bde56059e630399ce4bc5c1502a5296

  • SHA512

    3c2b2690fa49f75a7b987e6e6658f2a34a548c1b1497dc16748e64eefd2236ce5baa5621aef18753f8ddc087cf20200b64741169ed0c8058063f06f32526d1c3

  • SSDEEP

    12288:Fbdwa5NYkVSsTMDFEgqeRjP73lxNQvFHHbb/lb/////////////////FPTPRt:NqazYZsTYFlFP71xNiHbhb/////////J

Malware Config

Targets

    • Target

      a255f84c37ae5dfa20453a9dafdc540f8bde56059e630399ce4bc5c1502a5296

    • Size

      753KB

    • MD5

      881e968ddf34c38943a56651a3870174

    • SHA1

      e53ce4b02ba94d3dbc36c09b4e6ae6bfa8960bf6

    • SHA256

      a255f84c37ae5dfa20453a9dafdc540f8bde56059e630399ce4bc5c1502a5296

    • SHA512

      3c2b2690fa49f75a7b987e6e6658f2a34a548c1b1497dc16748e64eefd2236ce5baa5621aef18753f8ddc087cf20200b64741169ed0c8058063f06f32526d1c3

    • SSDEEP

      12288:Fbdwa5NYkVSsTMDFEgqeRjP73lxNQvFHHbb/lb/////////////////FPTPRt:NqazYZsTYFlFP71xNiHbhb/////////J

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks