General

  • Target

    6933bcecd2c0681ecdbc378b51b97383b95d18df3266d2294727fab93d4e6227

  • Size

    1.8MB

  • Sample

    220724-sswv4shaal

  • MD5

    330849aeb955e4963b40b735b1fffe06

  • SHA1

    ef6cce85f0b20c89eaeb14a49e3312102bd7d9a3

  • SHA256

    6933bcecd2c0681ecdbc378b51b97383b95d18df3266d2294727fab93d4e6227

  • SHA512

    a3e75846091a26bcd441d85111a84353e67de863a670e7254b86b6f51e99ef222c86fab54b8b54ade298bd1a1aaedd7b3e8e933b45c2996a1a81dff9eaa205ae

Malware Config

Targets

    • Target

      6933bcecd2c0681ecdbc378b51b97383b95d18df3266d2294727fab93d4e6227

    • Size

      1.8MB

    • MD5

      330849aeb955e4963b40b735b1fffe06

    • SHA1

      ef6cce85f0b20c89eaeb14a49e3312102bd7d9a3

    • SHA256

      6933bcecd2c0681ecdbc378b51b97383b95d18df3266d2294727fab93d4e6227

    • SHA512

      a3e75846091a26bcd441d85111a84353e67de863a670e7254b86b6f51e99ef222c86fab54b8b54ade298bd1a1aaedd7b3e8e933b45c2996a1a81dff9eaa205ae

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Drops startup file

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Tasks