General

  • Target

    #0034004 SHIPPING ITEMS LISTED pdf.exe

  • Size

    1.1MB

  • Sample

    200314-tsgk3qqp22

  • MD5

    909fc4fc06c72165829eb0dc45ec6fa2

  • SHA1

    87673992368f3db1a973c1d1f04bd11eecbf8470

  • SHA256

    ffe06faf3552c18f24916d1068805503c668c7cc34e9fd90266d04571c6ad94a

  • SHA512

    336ca81a032fa11c992cc25bd74b269b14ec092e2fa23df9d534006ec19441bde8862a3789782fd7121c3a43a8dd3ee5fc76654de6cba8d1d7847ec940fff8cb

Malware Config

Targets

    • Target

      #0034004 SHIPPING ITEMS LISTED pdf.exe

    • Size

      1.1MB

    • MD5

      909fc4fc06c72165829eb0dc45ec6fa2

    • SHA1

      87673992368f3db1a973c1d1f04bd11eecbf8470

    • SHA256

      ffe06faf3552c18f24916d1068805503c668c7cc34e9fd90266d04571c6ad94a

    • SHA512

      336ca81a032fa11c992cc25bd74b269b14ec092e2fa23df9d534006ec19441bde8862a3789782fd7121c3a43a8dd3ee5fc76654de6cba8d1d7847ec940fff8cb

    • HawkEye Reborn

      HawkEye Reborn is an enchanced version of the HawkEye malware kit.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks