General

  • Target

    52f1f68ad6d6d41457a856ed5e1d35184572faa2aaf0078335b921498bc1796e

  • Size

    552KB

  • Sample

    220310-wqt6aahge5

  • MD5

    ccd4605bb9b6afcf5ceecee4d66aaf6c

  • SHA1

    7e7cafd2f9ae5350c732a05d3b30a460b37ecf4d

  • SHA256

    52f1f68ad6d6d41457a856ed5e1d35184572faa2aaf0078335b921498bc1796e

  • SHA512

    0b545ac52adc7d3ca62f24d08f62f52f1ecbf4b1de76f1b694953e430ebc1d5534242d07f330c0516eaf812a34b27246000f1b5c949d73ac5ae4e335ee4bd383

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      52f1f68ad6d6d41457a856ed5e1d35184572faa2aaf0078335b921498bc1796e

    • Size

      552KB

    • MD5

      ccd4605bb9b6afcf5ceecee4d66aaf6c

    • SHA1

      7e7cafd2f9ae5350c732a05d3b30a460b37ecf4d

    • SHA256

      52f1f68ad6d6d41457a856ed5e1d35184572faa2aaf0078335b921498bc1796e

    • SHA512

      0b545ac52adc7d3ca62f24d08f62f52f1ecbf4b1de76f1b694953e430ebc1d5534242d07f330c0516eaf812a34b27246000f1b5c949d73ac5ae4e335ee4bd383

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks