General

  • Target

    c714bf1d154e7316b7be2f1cc788e390ff22c0729442d36242233564b7851f25

  • Size

    380KB

  • Sample

    221123-xz16mage57

  • MD5

    c1b5a66001fb42a800f4d752f81af14d

  • SHA1

    09157a77f3ec58014ce7942937e1e25ce09e900a

  • SHA256

    c714bf1d154e7316b7be2f1cc788e390ff22c0729442d36242233564b7851f25

  • SHA512

    464fd86992352f01f728c18ce6b19cb6666c552efb65b2cd5dea9e82318a0c1919779a45e7f4c9e1c32766a9444dcb733da416d4d83744ffefed413104e73f62

  • SSDEEP

    6144:51oGRDOh9czp8VCBUqL4L/GczUfhCbTuVx82Et/wIySTvY2ISVCuVuY/mQ:51LRg9cz8/joZCbTuVx8pwIjvYkdIE

Malware Config

Targets

    • Target

      c714bf1d154e7316b7be2f1cc788e390ff22c0729442d36242233564b7851f25

    • Size

      380KB

    • MD5

      c1b5a66001fb42a800f4d752f81af14d

    • SHA1

      09157a77f3ec58014ce7942937e1e25ce09e900a

    • SHA256

      c714bf1d154e7316b7be2f1cc788e390ff22c0729442d36242233564b7851f25

    • SHA512

      464fd86992352f01f728c18ce6b19cb6666c552efb65b2cd5dea9e82318a0c1919779a45e7f4c9e1c32766a9444dcb733da416d4d83744ffefed413104e73f62

    • SSDEEP

      6144:51oGRDOh9czp8VCBUqL4L/GczUfhCbTuVx82Et/wIySTvY2ISVCuVuY/mQ:51LRg9cz8/joZCbTuVx8pwIjvYkdIE

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks