General

  • Target

    6e14dc342324c0383a525353b333b29ccefaa70463a82be6896c7e1b3930f696

  • Size

    1.2MB

  • Sample

    241108-aeltwa1ckh

  • MD5

    79c28c7b05ad270df56f3b60fa8b8825

  • SHA1

    9008fea611d4c815117c348a527b36f240534aee

  • SHA256

    6e14dc342324c0383a525353b333b29ccefaa70463a82be6896c7e1b3930f696

  • SHA512

    7a23f83482c63b0dbf6526d81617df14b9a46fc0f1a184bb8d7446ffc3dafb26810e974ce9b3ae4ad13e65055b851147a0a70d26e865ccc876cd8f687ad994f3

  • SSDEEP

    24576:phntGx9yVf41ob4s6ABttGZOATIZXTnR1y:3tGZ1oEEbG8xXjy

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.zoho.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Diego1986

Targets

    • Target

      6e14dc342324c0383a525353b333b29ccefaa70463a82be6896c7e1b3930f696

    • Size

      1.2MB

    • MD5

      79c28c7b05ad270df56f3b60fa8b8825

    • SHA1

      9008fea611d4c815117c348a527b36f240534aee

    • SHA256

      6e14dc342324c0383a525353b333b29ccefaa70463a82be6896c7e1b3930f696

    • SHA512

      7a23f83482c63b0dbf6526d81617df14b9a46fc0f1a184bb8d7446ffc3dafb26810e974ce9b3ae4ad13e65055b851147a0a70d26e865ccc876cd8f687ad994f3

    • SSDEEP

      24576:phntGx9yVf41ob4s6ABttGZOATIZXTnR1y:3tGZ1oEEbG8xXjy

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks