General

  • Target

    8776a4ee8b6b13af9c666e4f6e55c7d970cb72d2f507f4fa6781fe7b94d390a3

  • Size

    608KB

  • Sample

    220625-fqqj4aheb9

  • MD5

    8152cac14bc11bd6c1b8a96815210daf

  • SHA1

    d724292b5cf0cfc479f06f8fa61bfd78cab782b2

  • SHA256

    8776a4ee8b6b13af9c666e4f6e55c7d970cb72d2f507f4fa6781fe7b94d390a3

  • SHA512

    9531a28c23a1b94c178f9cc226c6d5530efcc8b17708fd27395f4388a36de5abcc822c065df2b06a7fecc9c7628c6bfa8d15fb507904da96f4c888a5546c7d90

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    divi@accauto.co
  • Password:
    7213575aceACE$

Targets

    • Target

      8776a4ee8b6b13af9c666e4f6e55c7d970cb72d2f507f4fa6781fe7b94d390a3

    • Size

      608KB

    • MD5

      8152cac14bc11bd6c1b8a96815210daf

    • SHA1

      d724292b5cf0cfc479f06f8fa61bfd78cab782b2

    • SHA256

      8776a4ee8b6b13af9c666e4f6e55c7d970cb72d2f507f4fa6781fe7b94d390a3

    • SHA512

      9531a28c23a1b94c178f9cc226c6d5530efcc8b17708fd27395f4388a36de5abcc822c065df2b06a7fecc9c7628c6bfa8d15fb507904da96f4c888a5546c7d90

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks