General

  • Target

    1624789915bc665738ae6929c99b5154a2a412e7a6f403fa83a39fa6aa399649

  • Size

    663KB

  • Sample

    221125-vzk4ascd96

  • MD5

    23e3843d6ba5ecf5db015da9daade6f0

  • SHA1

    560c8361ab027ba4f68f951b34f406d8ec3fae84

  • SHA256

    1624789915bc665738ae6929c99b5154a2a412e7a6f403fa83a39fa6aa399649

  • SHA512

    d23e45ebbb8af5a5c1bf68421d1568680700f6331d7cfd069a000436e5a79b1eb7c05dbf26f7cc10d2db99af84a723c261b9125beb50884195b59e77aacce1ea

  • SSDEEP

    12288:RR3MjikzflCQ/PpFt0KherQh+XNd/A18Wd+1FJmT9lsvAh3ilQ5fAdG0TBH7:RR3AggPpv4Qqj/AelJmBlYIQdG0T

Malware Config

Targets

    • Target

      1624789915bc665738ae6929c99b5154a2a412e7a6f403fa83a39fa6aa399649

    • Size

      663KB

    • MD5

      23e3843d6ba5ecf5db015da9daade6f0

    • SHA1

      560c8361ab027ba4f68f951b34f406d8ec3fae84

    • SHA256

      1624789915bc665738ae6929c99b5154a2a412e7a6f403fa83a39fa6aa399649

    • SHA512

      d23e45ebbb8af5a5c1bf68421d1568680700f6331d7cfd069a000436e5a79b1eb7c05dbf26f7cc10d2db99af84a723c261b9125beb50884195b59e77aacce1ea

    • SSDEEP

      12288:RR3MjikzflCQ/PpFt0KherQh+XNd/A18Wd+1FJmT9lsvAh3ilQ5fAdG0TBH7:RR3AggPpv4Qqj/AelJmBlYIQdG0T

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks