General

  • Target

    699a6aac01b01c35c3c5da0825339fbf481ce2d39fd4546dc99eda9729954ca3

  • Size

    552KB

  • Sample

    220310-d57qtagdfp

  • MD5

    85efbbd9244db86c7fd1f8414724d6f9

  • SHA1

    124179c4c6799c497e22d8e50b242c850b6d03a2

  • SHA256

    699a6aac01b01c35c3c5da0825339fbf481ce2d39fd4546dc99eda9729954ca3

  • SHA512

    c94fbf6812149e361531b710867050ca55b22432df61860351b8dc4602acf8e0af7ba4592afc7e155c7e75b4545defcc3eaf05ed5c89795a6cbd67b74c57614e

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      699a6aac01b01c35c3c5da0825339fbf481ce2d39fd4546dc99eda9729954ca3

    • Size

      552KB

    • MD5

      85efbbd9244db86c7fd1f8414724d6f9

    • SHA1

      124179c4c6799c497e22d8e50b242c850b6d03a2

    • SHA256

      699a6aac01b01c35c3c5da0825339fbf481ce2d39fd4546dc99eda9729954ca3

    • SHA512

      c94fbf6812149e361531b710867050ca55b22432df61860351b8dc4602acf8e0af7ba4592afc7e155c7e75b4545defcc3eaf05ed5c89795a6cbd67b74c57614e

    Score
    9/10
    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks