General

  • Target

    Zahlungsbestätigung.exe

  • Size

    583KB

  • Sample

    200707-4la3ae3f7x

  • MD5

    3c330f32f0b8812e072568e98adf1f1c

  • SHA1

    cd1a65820235eeb9e6655e8290326f422270115c

  • SHA256

    be4e6e428abbddc9ae13c274c65f86d9633a274ee45aaff9c32311b1a0e2b471

  • SHA512

    db394c95c979fa5637e142210cb7119f9f72af11f6daf9dacae6862452ebf479f9622baed66067345e6f3519890820b70cafcd51f2487ce6d9b831b7823a0447

Malware Config

Targets

    • Target

      Zahlungsbestätigung.exe

    • Size

      583KB

    • MD5

      3c330f32f0b8812e072568e98adf1f1c

    • SHA1

      cd1a65820235eeb9e6655e8290326f422270115c

    • SHA256

      be4e6e428abbddc9ae13c274c65f86d9633a274ee45aaff9c32311b1a0e2b471

    • SHA512

      db394c95c979fa5637e142210cb7119f9f72af11f6daf9dacae6862452ebf479f9622baed66067345e6f3519890820b70cafcd51f2487ce6d9b831b7823a0447

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks