General

  • Target

    4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8cN.exe

  • Size

    616KB

  • Sample

    241129-flrllawqhz

  • MD5

    8c9614d97173e2afa602be50fccec1d0

  • SHA1

    26790a2b3b7d21ed9303865e22edc66644545e3c

  • SHA256

    4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8c

  • SHA512

    8db74b48149d94876cccd587a0c4d161095d3c79b17bb9af0f5601c24857644f1528c0121fd4b5e817c3184a4926dfae96561afb04a505555d5c6fc019c42fab

  • SSDEEP

    12288:ZqkZpmvsQtqB5urTIoYWBQk1E+VF9mOx9SQL0+4:wsQtqBorTlYWBhE+V3mO5U

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    dtyjnsyxuroscsgo

Targets

    • Target

      4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8cN.exe

    • Size

      616KB

    • MD5

      8c9614d97173e2afa602be50fccec1d0

    • SHA1

      26790a2b3b7d21ed9303865e22edc66644545e3c

    • SHA256

      4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8c

    • SHA512

      8db74b48149d94876cccd587a0c4d161095d3c79b17bb9af0f5601c24857644f1528c0121fd4b5e817c3184a4926dfae96561afb04a505555d5c6fc019c42fab

    • SSDEEP

      12288:ZqkZpmvsQtqB5urTIoYWBQk1E+VF9mOx9SQL0+4:wsQtqBorTlYWBhE+V3mO5U

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks