General

  • Target

    f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6

  • Size

    1.0MB

  • Sample

    221126-kkj8caaa8s

  • MD5

    fe1df217cd9801646ae835277835ce90

  • SHA1

    9574dc64370a6e4921dfefcbe1e96f578c1a7b46

  • SHA256

    f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6

  • SHA512

    2a3f3daab18ebee123927ffdbbf4894b618227c3c2cf626a5e18e18f421a6acec68d17946ae79bd06cab34fd9f2eb3d3f02273816760f582fcd3556f21bae10c

  • SSDEEP

    24576:+1jWWBXw6JlaAmq+ptL170MxkA+P37ESA48vx2QvaDxSC+cz:+ZbA6Jl831YMxkAswSGixSC+

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mattroy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    N!ssan7a

Targets

    • Target

      f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6

    • Size

      1.0MB

    • MD5

      fe1df217cd9801646ae835277835ce90

    • SHA1

      9574dc64370a6e4921dfefcbe1e96f578c1a7b46

    • SHA256

      f42bb1e261058f5070d599c0a7b554ecee8df043dd4e496c6774374375d9ffc6

    • SHA512

      2a3f3daab18ebee123927ffdbbf4894b618227c3c2cf626a5e18e18f421a6acec68d17946ae79bd06cab34fd9f2eb3d3f02273816760f582fcd3556f21bae10c

    • SSDEEP

      24576:+1jWWBXw6JlaAmq+ptL170MxkA+P37ESA48vx2QvaDxSC+cz:+ZbA6Jl831YMxkAswSGixSC+

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks