General

  • Target

    71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06

  • Size

    552KB

  • Sample

    220310-bjpxrsfbhq

  • MD5

    cb54538b9db0e01d64b39ffaae86c500

  • SHA1

    23687f646854aeccacb79197eac450dc0524969d

  • SHA256

    71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06

  • SHA512

    9dc6e512af7f715ffbdedccf888b3299e59c669bb795cc1a9cf9c269bbe2d3f83678cf695450c32306259903fed0768ab76102ae920497810eaacc45a4884032

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06

    • Size

      552KB

    • MD5

      cb54538b9db0e01d64b39ffaae86c500

    • SHA1

      23687f646854aeccacb79197eac450dc0524969d

    • SHA256

      71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06

    • SHA512

      9dc6e512af7f715ffbdedccf888b3299e59c669bb795cc1a9cf9c269bbe2d3f83678cf695450c32306259903fed0768ab76102ae920497810eaacc45a4884032

    Score
    9/10
    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks