General

  • Target

    d19b6aed505eff9ee12bbfcff22a8e24211f79d6be0e688846de1697a2b8650f

  • Size

    552KB

  • Sample

    220314-e7rcaafbam

  • MD5

    599c73d63b208f6299d150565905a926

  • SHA1

    41ceb24fc6649f129b7a08601324c5f785b3a034

  • SHA256

    d19b6aed505eff9ee12bbfcff22a8e24211f79d6be0e688846de1697a2b8650f

  • SHA512

    cbf3a3089591a8cac41c24755f1028ebbbe394f7b9e94109d7af9e6734c1562b76767d77119f38e796a3b36cbaa6b139b7ba6f785e119d93c7b548de06ea098f

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      d19b6aed505eff9ee12bbfcff22a8e24211f79d6be0e688846de1697a2b8650f

    • Size

      552KB

    • MD5

      599c73d63b208f6299d150565905a926

    • SHA1

      41ceb24fc6649f129b7a08601324c5f785b3a034

    • SHA256

      d19b6aed505eff9ee12bbfcff22a8e24211f79d6be0e688846de1697a2b8650f

    • SHA512

      cbf3a3089591a8cac41c24755f1028ebbbe394f7b9e94109d7af9e6734c1562b76767d77119f38e796a3b36cbaa6b139b7ba6f785e119d93c7b548de06ea098f

    Score
    9/10
    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks