Resubmissions

11/03/2025, 15:04

250311-sfzq8swmt5 8

11/03/2025, 14:20

250311-rnmwzavmx7 8

11/03/2025, 13:45

250311-q2pr2svyby 8

10/03/2025, 19:09

250310-xtytbavzcs 8

10/03/2025, 19:01

250310-xplyysvxhz 8

10/03/2025, 18:29

250310-w42ghstps7 8

10/03/2025, 15:21

250310-srpqeazshz 4

10/03/2025, 14:53

250310-r9d6ysyxdv 8

10/03/2025, 14:46

250310-r5e8fsywes 6

09/03/2025, 18:14

250309-wvp25axvd1 10

General

  • Target

    test.txt

  • Size

    18B

  • Sample

    250215-nq2lcsznbj

  • MD5

    5b3f97d48c8751bd031b7ea53545bdb6

  • SHA1

    88be3374c62f23406ec83bb11279f8423bd3f88d

  • SHA256

    d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

  • SHA512

    ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.office365.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    kokotkokot15

Targets

    • Target

      test.txt

    • Size

      18B

    • MD5

      5b3f97d48c8751bd031b7ea53545bdb6

    • SHA1

      88be3374c62f23406ec83bb11279f8423bd3f88d

    • SHA256

      d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

    • SHA512

      ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Downloads MZ/PE file

    • Modifies service settings

      Alters the configuration of existing services.

    • A potential corporate email address has been identified in the URL: [email protected]

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Detected potential entity reuse from brand MICROSOFT.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks