General

  • Target

    07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b

  • Size

    1.0MB

  • Sample

    221126-qsxfjafh43

  • MD5

    0d3ded48db36dab61e96359a41e86419

  • SHA1

    df7825bfa9e0721aff777bd3f4786afe8a35dc68

  • SHA256

    07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b

  • SHA512

    14eefc8672304b7bd77f1a03d3d48857ca21909a55f1c9fe7eaa23be2c6bf332691793a0f24d0c0b1e4cfdb820106a2c6d2e22168768661a7618bb3dbc08cb3c

  • SSDEEP

    24576:bI1xoQrUbqJd1G8CX4KnMseCuwBVA0mqG0sLi:UzrsxNT0W+0mw

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.mattroy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    N!ssan7a

Targets

    • Target

      07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b

    • Size

      1.0MB

    • MD5

      0d3ded48db36dab61e96359a41e86419

    • SHA1

      df7825bfa9e0721aff777bd3f4786afe8a35dc68

    • SHA256

      07861524ef9965f4e34c242c61678424db5d907dd4f1f756ad25c07e0b9e9d6b

    • SHA512

      14eefc8672304b7bd77f1a03d3d48857ca21909a55f1c9fe7eaa23be2c6bf332691793a0f24d0c0b1e4cfdb820106a2c6d2e22168768661a7618bb3dbc08cb3c

    • SSDEEP

      24576:bI1xoQrUbqJd1G8CX4KnMseCuwBVA0mqG0sLi:UzrsxNT0W+0mw

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Collection

Email Collection

1
T1114

Tasks