General

  • Target

    67edd4b23eaeea7d7dfd4c3bfa722d939a0e54f01ff0f3945b450617420025da

  • Size

    619KB

  • Sample

    221125-vkl22sbh24

  • MD5

    02d31b47cd3b10b80472c52fd9fd24c1

  • SHA1

    9aa44e8335404c28ef1e155e5e08263dc864fc70

  • SHA256

    67edd4b23eaeea7d7dfd4c3bfa722d939a0e54f01ff0f3945b450617420025da

  • SHA512

    ec96ca44ea32c4a606c874b713c07769700455132ed97c0a92ab6ef84b27b7a018df7b19ebd021c6b975797fa8eac5c98c0e02bae93d4c492c42c516801d9997

  • SSDEEP

    12288:NqTSrqmGP2dDvxM2j+9zLllMOSM3LIre1LJl8L/6gW11TVIwMZh:NqTSrK25x/+Jw5M3LIre1tl8L/da

Malware Config

Targets

    • Target

      67edd4b23eaeea7d7dfd4c3bfa722d939a0e54f01ff0f3945b450617420025da

    • Size

      619KB

    • MD5

      02d31b47cd3b10b80472c52fd9fd24c1

    • SHA1

      9aa44e8335404c28ef1e155e5e08263dc864fc70

    • SHA256

      67edd4b23eaeea7d7dfd4c3bfa722d939a0e54f01ff0f3945b450617420025da

    • SHA512

      ec96ca44ea32c4a606c874b713c07769700455132ed97c0a92ab6ef84b27b7a018df7b19ebd021c6b975797fa8eac5c98c0e02bae93d4c492c42c516801d9997

    • SSDEEP

      12288:NqTSrqmGP2dDvxM2j+9zLllMOSM3LIre1LJl8L/6gW11TVIwMZh:NqTSrK25x/+Jw5M3LIre1tl8L/da

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks