General

  • Target

    d50299a814763b3f5ae343aa9838fff61b5d6d39dca0fb9ce0efbed60024adfe

  • Size

    611KB

  • Sample

    221124-xbsjkscb84

  • MD5

    ca115fd8fde6b46b80d9c603a354fc4a

  • SHA1

    a4669c16f362ac74daa7c6c562464b518876b2c6

  • SHA256

    d50299a814763b3f5ae343aa9838fff61b5d6d39dca0fb9ce0efbed60024adfe

  • SHA512

    8f2fade088047a6942f83f4798206efd53ebe4645a2e2116d0dd05c2e965a69a37648f142b2cbc05bc75aa442eadf9d07d5322a0aa9e9335f5f748eef697f7c7

  • SSDEEP

    12288:vq85mv7W7CRGsEa1onusQAOvu/wP7VwpJ/DJ1PIF6Pu:G7O+5onusZOvX7WpJ/tt

Malware Config

Targets

    • Target

      d50299a814763b3f5ae343aa9838fff61b5d6d39dca0fb9ce0efbed60024adfe

    • Size

      611KB

    • MD5

      ca115fd8fde6b46b80d9c603a354fc4a

    • SHA1

      a4669c16f362ac74daa7c6c562464b518876b2c6

    • SHA256

      d50299a814763b3f5ae343aa9838fff61b5d6d39dca0fb9ce0efbed60024adfe

    • SHA512

      8f2fade088047a6942f83f4798206efd53ebe4645a2e2116d0dd05c2e965a69a37648f142b2cbc05bc75aa442eadf9d07d5322a0aa9e9335f5f748eef697f7c7

    • SSDEEP

      12288:vq85mv7W7CRGsEa1onusQAOvu/wP7VwpJ/DJ1PIF6Pu:G7O+5onusZOvX7WpJ/tt

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks