General

  • Target

    Pagamento 2.exe

  • Size

    743KB

  • Sample

    200714-5r6yzvf2ks

  • MD5

    1bfa17fbb313ef26a2384e5ccbd846db

  • SHA1

    93855ee04ae059dce0c8753feeb179d75c2d954e

  • SHA256

    3634bc353643a382dc730729771f212f69c8f3fa489bd4ff843a3985076fdc46

  • SHA512

    51891fe2d932405fe2df2cda0ad13054173abbef88cc59d40d5b3cf9f11f5ff51d6abceda502cc1f22462a0007e128bb9f6df2d2e11b6814b2ecea1fb7a4ba85

Malware Config

Targets

    • Target

      Pagamento 2.exe

    • Size

      743KB

    • MD5

      1bfa17fbb313ef26a2384e5ccbd846db

    • SHA1

      93855ee04ae059dce0c8753feeb179d75c2d954e

    • SHA256

      3634bc353643a382dc730729771f212f69c8f3fa489bd4ff843a3985076fdc46

    • SHA512

      51891fe2d932405fe2df2cda0ad13054173abbef88cc59d40d5b3cf9f11f5ff51d6abceda502cc1f22462a0007e128bb9f6df2d2e11b6814b2ecea1fb7a4ba85

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks