General
-
Target
RNSM00404.7z
-
Size
25.8MB
-
Sample
241028-z514xsxfke
-
MD5
844dfc4810bde18e3da4d092cd560d5c
-
SHA1
2a5725892a4483405c2f26bf8a13cc2a45227f74
-
SHA256
740156feb78cfac7d5857440644d1f48d92e11dafc19254fe242f1d88c77845e
-
SHA512
6e92f563364c8d8afb7da868eefa850af85b01cc5b281dc24767d5b663761ea2b7c681c003ffaa84652475a3b9e789286f39de7a98a18aea55ad492ade713f7a
-
SSDEEP
786432:aFfGfapEu6jExCTmhParsGQMI/ukByRu76G0irc:2f1p+cCEPFGQUZRzG0ig
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00404.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
104.227.244.138
Extracted
hawkeye_reborn
9.0.1.6
Protocol: smtp- Host:
smtp.bestbirdss.com - Port:
587 - Username:
[email protected] - Password:
Cfv)Prr8
dc1aa356-573e-4e3b-ad69-c046a924da8c
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:Cfv)Prr8 _EmailPort:587 _EmailSSL:false _EmailServer:smtp.bestbirdss.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:30 _MeltFile:false _Mutex:dc1aa356-573e-4e3b-ad69-c046a924da8c _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:9.0.1.6 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - Reborn v9, Version=9.0.1.6, Culture=neutral, PublicKeyToken=null
Targets
-
-
Target
RNSM00404.7z
-
Size
25.8MB
-
MD5
844dfc4810bde18e3da4d092cd560d5c
-
SHA1
2a5725892a4483405c2f26bf8a13cc2a45227f74
-
SHA256
740156feb78cfac7d5857440644d1f48d92e11dafc19254fe242f1d88c77845e
-
SHA512
6e92f563364c8d8afb7da868eefa850af85b01cc5b281dc24767d5b663761ea2b7c681c003ffaa84652475a3b9e789286f39de7a98a18aea55ad492ade713f7a
-
SSDEEP
786432:aFfGfapEu6jExCTmhParsGQMI/ukByRu76G0irc:2f1p+cCEPFGQUZRzG0ig
-
CrimsonRAT main payload
-
Crimsonrat family
-
GandCrab payload
-
Gandcrab family
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
Hawkeye_reborn family
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
M00nd3v_logger family
-
Modifies WinLogon for persistence
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Renames multiple (1842) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
4Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1