General

  • Target

    a47994bde8fa55a225b60bbcdb3b23e67c08772c4c3ab3df7ca03664a76d2e67

  • Size

    503KB

  • Sample

    221123-qrlmmsef62

  • MD5

    562f926dee5e43193d06e3475545c7f2

  • SHA1

    6df6758d87056df0947542d3b98a0655a977a5c8

  • SHA256

    a47994bde8fa55a225b60bbcdb3b23e67c08772c4c3ab3df7ca03664a76d2e67

  • SHA512

    86b64fe79e5a77c440d806d6d1e1770d0fa1e7e7aaf7e21ce57294fedd500b03b47728b3ad194930484e68e85c2e1514c5a05112df75229d640931db12743361

  • SSDEEP

    6144:/bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx97HD:/QtqB5urTIoYWBQk1E+VF9mOx9v

Malware Config

Targets

    • Target

      a47994bde8fa55a225b60bbcdb3b23e67c08772c4c3ab3df7ca03664a76d2e67

    • Size

      503KB

    • MD5

      562f926dee5e43193d06e3475545c7f2

    • SHA1

      6df6758d87056df0947542d3b98a0655a977a5c8

    • SHA256

      a47994bde8fa55a225b60bbcdb3b23e67c08772c4c3ab3df7ca03664a76d2e67

    • SHA512

      86b64fe79e5a77c440d806d6d1e1770d0fa1e7e7aaf7e21ce57294fedd500b03b47728b3ad194930484e68e85c2e1514c5a05112df75229d640931db12743361

    • SSDEEP

      6144:/bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx97HD:/QtqB5urTIoYWBQk1E+VF9mOx9v

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks