General

  • Target

    af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b

  • Size

    556KB

  • Sample

    220311-22v5lscdc8

  • MD5

    66c4a1199972a1712996ef9c09048124

  • SHA1

    9a7a183e8be933d5b10512a00d21a94499cb5116

  • SHA256

    af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b

  • SHA512

    ca5e2ab7b4977e310912bc874fdbe500bdac53cf3f2fe94cfd3ada1f2e7cb77393751ec51707e4675869979633179483204ff91caba56f1ef2974754f350bc8f

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b

    • Size

      556KB

    • MD5

      66c4a1199972a1712996ef9c09048124

    • SHA1

      9a7a183e8be933d5b10512a00d21a94499cb5116

    • SHA256

      af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b

    • SHA512

      ca5e2ab7b4977e310912bc874fdbe500bdac53cf3f2fe94cfd3ada1f2e7cb77393751ec51707e4675869979633179483204ff91caba56f1ef2974754f350bc8f

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Sets file execution options in registry

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks