General

  • Target

    1eabe927e95b2e63315117c2f1150313a6db28ed15445f6694e754fe865d858f

  • Size

    503KB

  • Sample

    221125-ep8hvadh6s

  • MD5

    d14fd08162c0eb2971895c138c8a0a92

  • SHA1

    4394c6b3f0b31942b5412048bc95d2e0c4c8e1f4

  • SHA256

    1eabe927e95b2e63315117c2f1150313a6db28ed15445f6694e754fe865d858f

  • SHA512

    832e6b88fc3d303d39391d34bad3897f0924e8f0fa8c8c864b8f26c157676bfbc62e06cd598695a1d3912ecb6ca8fc895022cee9548d97cf750d661ca648940b

  • SSDEEP

    12288:GNI2vKsCY5oXqe9uWKlw5wrpMFwb/uJlPmK4CkivD3W6Og:a+XqCuWuUFk/4lPPntz

Malware Config

Targets

    • Target

      1eabe927e95b2e63315117c2f1150313a6db28ed15445f6694e754fe865d858f

    • Size

      503KB

    • MD5

      d14fd08162c0eb2971895c138c8a0a92

    • SHA1

      4394c6b3f0b31942b5412048bc95d2e0c4c8e1f4

    • SHA256

      1eabe927e95b2e63315117c2f1150313a6db28ed15445f6694e754fe865d858f

    • SHA512

      832e6b88fc3d303d39391d34bad3897f0924e8f0fa8c8c864b8f26c157676bfbc62e06cd598695a1d3912ecb6ca8fc895022cee9548d97cf750d661ca648940b

    • SSDEEP

      12288:GNI2vKsCY5oXqe9uWKlw5wrpMFwb/uJlPmK4CkivD3W6Og:a+XqCuWuUFk/4lPPntz

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks