General

  • Target

    6125f09f48dd96a52c004d065b20fcf32f69b7be2b0dd538ab9c72687f42c808

  • Size

    1.1MB

  • Sample

    220730-1yah3ababn

  • MD5

    a1cf5ab803072323cba5e074cbc140d4

  • SHA1

    c367153ba5a4e426c4746ee7f4652a50ff45aa4c

  • SHA256

    6125f09f48dd96a52c004d065b20fcf32f69b7be2b0dd538ab9c72687f42c808

  • SHA512

    d16626671dfbaf33caa409d6a135bea1817a9cfb8f0cee4445bb7469a76636fe08c98862cabefcad1966c92f8a1177d3cc3bebeb27dbc09e0efbd7f1c2ced190

Malware Config

Targets

    • Target

      statement of account MARCH END.exe

    • Size

      2.2MB

    • MD5

      0ba173af7380bbe70d970caec82ffc36

    • SHA1

      8d5e57a20617d338fdf05c7c6b69a974c6193418

    • SHA256

      94d061976f1bfc6f56cfacec9e19a87e9e553fb2fd99f67900cf71a72d348a3b

    • SHA512

      2f5e1ae195fb6ea6c99b9c21fc90bb9c68c551e215f7ecf0dd8ac3da615bb4562ed1de7b0dd96dcc828b980fd4a5e87a6559388ec1ee640c7f119177ad659a72

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks