General

  • Target

    ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238

  • Size

    552KB

  • Sample

    220311-3r6n2afgfq

  • MD5

    d66feb659ac89c7b831de8f4eac2cd00

  • SHA1

    7c0df950eb093d252f645c0242f6152fbcdb995c

  • SHA256

    ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238

  • SHA512

    83b9a3c10acb24c825e807bbe804ad4b09c8789c938a2ec715da43eeb05f251caedc5db8a7f23939449f3e42ef4f90901b4a9f35eb72a7e2922eb9161cb76571

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238

    • Size

      552KB

    • MD5

      d66feb659ac89c7b831de8f4eac2cd00

    • SHA1

      7c0df950eb093d252f645c0242f6152fbcdb995c

    • SHA256

      ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238

    • SHA512

      83b9a3c10acb24c825e807bbe804ad4b09c8789c938a2ec715da43eeb05f251caedc5db8a7f23939449f3e42ef4f90901b4a9f35eb72a7e2922eb9161cb76571

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Sets file execution options in registry

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks