General

  • Target

    1736da0d12474947347cdd7b6e7bd69ef76d35b91766dac3b63b806eea2f8fa9

  • Size

    849KB

  • Sample

    221126-tv14aagc52

  • MD5

    949a39508f948591e83e03df4a3448f7

  • SHA1

    e75e0b53f54a70647618ea0185b8ed32e733b070

  • SHA256

    1736da0d12474947347cdd7b6e7bd69ef76d35b91766dac3b63b806eea2f8fa9

  • SHA512

    45950c84c97a296768db6c0349e3ea583feb56848037c6c0b886e73c59dba13a04dff6716393f34991b83c2e564986fc85b6e6e9d6600ef2f9a6da26d0dce10f

  • SSDEEP

    24576:ss8LAMgDkDL7VlvjxMGtwPWp+jLErQ2GOVjj:s1D7IWxBj

Malware Config

Targets

    • Target

      1736da0d12474947347cdd7b6e7bd69ef76d35b91766dac3b63b806eea2f8fa9

    • Size

      849KB

    • MD5

      949a39508f948591e83e03df4a3448f7

    • SHA1

      e75e0b53f54a70647618ea0185b8ed32e733b070

    • SHA256

      1736da0d12474947347cdd7b6e7bd69ef76d35b91766dac3b63b806eea2f8fa9

    • SHA512

      45950c84c97a296768db6c0349e3ea583feb56848037c6c0b886e73c59dba13a04dff6716393f34991b83c2e564986fc85b6e6e9d6600ef2f9a6da26d0dce10f

    • SSDEEP

      24576:ss8LAMgDkDL7VlvjxMGtwPWp+jLErQ2GOVjj:s1D7IWxBj

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks