General

  • Target

    3c147fb846a956058d97aa94bb9eaf090e8df4bd53cd3edb79dcbb0efb1fed8e

  • Size

    568KB

  • Sample

    221126-vrm8paag72

  • MD5

    c323364e18bc8f3724b4c8aa07081aa1

  • SHA1

    0019a588fd5a2c20bec073a36485d2395c51131a

  • SHA256

    3c147fb846a956058d97aa94bb9eaf090e8df4bd53cd3edb79dcbb0efb1fed8e

  • SHA512

    38fda2f881ea3510c4338e496919c4570e62733cf4da14ef7f18167829301664f68932d101bffd34f989a6736c24aff85cea1a8417b467500a1f4351fdabd23d

  • SSDEEP

    12288:RxlhuyrAoUSpGBLYKXCMJel7Nk70bZxZabizankOV8Xc40N5:RxlhJMVBLYKXC0el7w0bZHaeOnk4cO

Malware Config

Targets

    • Target

      3c147fb846a956058d97aa94bb9eaf090e8df4bd53cd3edb79dcbb0efb1fed8e

    • Size

      568KB

    • MD5

      c323364e18bc8f3724b4c8aa07081aa1

    • SHA1

      0019a588fd5a2c20bec073a36485d2395c51131a

    • SHA256

      3c147fb846a956058d97aa94bb9eaf090e8df4bd53cd3edb79dcbb0efb1fed8e

    • SHA512

      38fda2f881ea3510c4338e496919c4570e62733cf4da14ef7f18167829301664f68932d101bffd34f989a6736c24aff85cea1a8417b467500a1f4351fdabd23d

    • SSDEEP

      12288:RxlhuyrAoUSpGBLYKXCMJel7Nk70bZxZabizankOV8Xc40N5:RxlhJMVBLYKXC0el7w0bZHaeOnk4cO

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks