General

  • Target

    8d75629fc4c1d59c4ad180ec38b8bc6b43752e953c5e37211f3c407c1b8a390e

  • Size

    552KB

  • Sample

    220312-k8svdsagf7

  • MD5

    6037a8bc18988878e9a2d154f4583b1b

  • SHA1

    1ab8b9d0e76410ee4a221679ff1360428521a010

  • SHA256

    8d75629fc4c1d59c4ad180ec38b8bc6b43752e953c5e37211f3c407c1b8a390e

  • SHA512

    b3682ec3988e12bb9f1853dc404ba63939922b1571cb2a1cbab50374c45bc3c28002102418cb9839cb0deb6aa5c92052e16cd86ac7bc9eb29e07e4fe9cb059e1

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      8d75629fc4c1d59c4ad180ec38b8bc6b43752e953c5e37211f3c407c1b8a390e

    • Size

      552KB

    • MD5

      6037a8bc18988878e9a2d154f4583b1b

    • SHA1

      1ab8b9d0e76410ee4a221679ff1360428521a010

    • SHA256

      8d75629fc4c1d59c4ad180ec38b8bc6b43752e953c5e37211f3c407c1b8a390e

    • SHA512

      b3682ec3988e12bb9f1853dc404ba63939922b1571cb2a1cbab50374c45bc3c28002102418cb9839cb0deb6aa5c92052e16cd86ac7bc9eb29e07e4fe9cb059e1

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks