General

  • Target

    662fe0e0357bb671ad6093dd62c0a19f5fa068e5e2c68b9d41f913d932d7f35a

  • Size

    633KB

  • Sample

    221123-vhym3ahb34

  • MD5

    a0dcfc4adaeafa48cb3ad9b5c2eb12c5

  • SHA1

    9bed93a36b8a250ad6abac9c8833e05b8ded5413

  • SHA256

    662fe0e0357bb671ad6093dd62c0a19f5fa068e5e2c68b9d41f913d932d7f35a

  • SHA512

    05b8c2296b604f7accfcfd086358559fd5fee8c80130f7a9cc71fbd7d425043b99e0531065c83b8854e457d581e23ade9b944e13b022c49c3439cf096bcfb0af

  • SSDEEP

    12288:OgpGAIKlnQ59VNfk4pq1/jLnvZHjKTzIjJfQ3yo/hgOqWgq/6cfGMLyygdpUe:OIg5jNM4urLRjKPQuCo1ge6cvLyygdpU

Malware Config

Targets

    • Target

      662fe0e0357bb671ad6093dd62c0a19f5fa068e5e2c68b9d41f913d932d7f35a

    • Size

      633KB

    • MD5

      a0dcfc4adaeafa48cb3ad9b5c2eb12c5

    • SHA1

      9bed93a36b8a250ad6abac9c8833e05b8ded5413

    • SHA256

      662fe0e0357bb671ad6093dd62c0a19f5fa068e5e2c68b9d41f913d932d7f35a

    • SHA512

      05b8c2296b604f7accfcfd086358559fd5fee8c80130f7a9cc71fbd7d425043b99e0531065c83b8854e457d581e23ade9b944e13b022c49c3439cf096bcfb0af

    • SSDEEP

      12288:OgpGAIKlnQ59VNfk4pq1/jLnvZHjKTzIjJfQ3yo/hgOqWgq/6cfGMLyygdpUe:OIg5jNM4urLRjKPQuCo1ge6cvLyygdpU

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks