General

  • Target

    aa9266ff03617a741d5f39aa1c56dc8902831b0e97b99cf1f5e3b3827f9aa483

  • Size

    552KB

  • Sample

    220312-ax6l1adda2

  • MD5

    ed19c0ef486b1536ec5024c09bbf680d

  • SHA1

    b0e734c80dbc9612479c18740728de95f4e22661

  • SHA256

    aa9266ff03617a741d5f39aa1c56dc8902831b0e97b99cf1f5e3b3827f9aa483

  • SHA512

    f92e5092a0357b414ca515bcbf429cc7367929dab23f6b1a1eb4e4f19d8072bec7c048b7addd0b07343d9b5b4b38c7ca61552379c06cb79731262d24b923528a

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      aa9266ff03617a741d5f39aa1c56dc8902831b0e97b99cf1f5e3b3827f9aa483

    • Size

      552KB

    • MD5

      ed19c0ef486b1536ec5024c09bbf680d

    • SHA1

      b0e734c80dbc9612479c18740728de95f4e22661

    • SHA256

      aa9266ff03617a741d5f39aa1c56dc8902831b0e97b99cf1f5e3b3827f9aa483

    • SHA512

      f92e5092a0357b414ca515bcbf429cc7367929dab23f6b1a1eb4e4f19d8072bec7c048b7addd0b07343d9b5b4b38c7ca61552379c06cb79731262d24b923528a

    Score
    9/10
    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks