General

  • Target

    67e3f822cf4a4ac06d29a008b2b8ce4ca6f30fa5c99d85a6f3fff1bcb73253b0

  • Size

    403KB

  • Sample

    221123-rebgksbd6w

  • MD5

    325a4d49b0ac357c735ba31645a95478

  • SHA1

    d9d62bcbd7a98146b8f453741f62e9d4bf7ca988

  • SHA256

    67e3f822cf4a4ac06d29a008b2b8ce4ca6f30fa5c99d85a6f3fff1bcb73253b0

  • SHA512

    70a748ba868a44cdbfecb03cf852d60488ca011a55d560441ec5b0caa810bfeaa2c1ead05999b7caf68bea2251fe7d7966a2403e3432eaea7031674d34e85ee5

  • SSDEEP

    12288:I+qGh5hKEdq54fmHVZ/plbvwHgW4ejvKL7N3JS7olV95Ke:IvGh54p54fyplMAW4ejOWcV95

Malware Config

Targets

    • Target

      67e3f822cf4a4ac06d29a008b2b8ce4ca6f30fa5c99d85a6f3fff1bcb73253b0

    • Size

      403KB

    • MD5

      325a4d49b0ac357c735ba31645a95478

    • SHA1

      d9d62bcbd7a98146b8f453741f62e9d4bf7ca988

    • SHA256

      67e3f822cf4a4ac06d29a008b2b8ce4ca6f30fa5c99d85a6f3fff1bcb73253b0

    • SHA512

      70a748ba868a44cdbfecb03cf852d60488ca011a55d560441ec5b0caa810bfeaa2c1ead05999b7caf68bea2251fe7d7966a2403e3432eaea7031674d34e85ee5

    • SSDEEP

      12288:I+qGh5hKEdq54fmHVZ/plbvwHgW4ejvKL7N3JS7olV95Ke:IvGh54p54fyplMAW4ejOWcV95

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks