General

  • Target

    f283a32d6e38b057353651c133e8abb802d1fd5ad6c93506c644c9cd029c3355

  • Size

    406KB

  • Sample

    221123-sxbqqsfe6x

  • MD5

    268f21e28c00f0290579c6af8b6b1691

  • SHA1

    4b1a10ede9f4f0e2c5666970b5568bb742f8eed8

  • SHA256

    f283a32d6e38b057353651c133e8abb802d1fd5ad6c93506c644c9cd029c3355

  • SHA512

    6c469e01d7aa4a34edfb85fec3ad189dcee338bf741f6a1bf85573816442008e63041b596d90b0bb24abc6540bf14a90e4a7bf87509a0f66b93ed271151ff7e9

  • SSDEEP

    6144:mbiX8ZbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihi3:kQtqB5urTIoYWBQkj

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Questions1

Targets

    • Target

      f283a32d6e38b057353651c133e8abb802d1fd5ad6c93506c644c9cd029c3355

    • Size

      406KB

    • MD5

      268f21e28c00f0290579c6af8b6b1691

    • SHA1

      4b1a10ede9f4f0e2c5666970b5568bb742f8eed8

    • SHA256

      f283a32d6e38b057353651c133e8abb802d1fd5ad6c93506c644c9cd029c3355

    • SHA512

      6c469e01d7aa4a34edfb85fec3ad189dcee338bf741f6a1bf85573816442008e63041b596d90b0bb24abc6540bf14a90e4a7bf87509a0f66b93ed271151ff7e9

    • SSDEEP

      6144:mbiX8ZbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihi3:kQtqB5urTIoYWBQkj

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks