General

  • Target

    ab2cc2ce9715dbf7ead7ab7e897ae983acda37601d6e5064ba245c804f082167

  • Size

    456KB

  • Sample

    221127-qyrr8sfc4t

  • MD5

    f51440eeac9dc43c37f75cd9d20b9cf4

  • SHA1

    6a203f1995569d62b0f8a0533ee166cc20fe80bc

  • SHA256

    ab2cc2ce9715dbf7ead7ab7e897ae983acda37601d6e5064ba245c804f082167

  • SHA512

    3894d775fcb0b40bec8ae92eea3ddc166bb69d0022f4cb243d482637f30c9e807ff4437744525aa57ac07191777c78786f6ee846a0b26eb25f333f7133934ed9

  • SSDEEP

    12288:hkb9GREILTZvK6513vCe+i2Ps7KagZTE+jX/ReTPVQ:mUREaNh3/+bk0ZTE+rUdQ

Malware Config

Targets

    • Target

      ab2cc2ce9715dbf7ead7ab7e897ae983acda37601d6e5064ba245c804f082167

    • Size

      456KB

    • MD5

      f51440eeac9dc43c37f75cd9d20b9cf4

    • SHA1

      6a203f1995569d62b0f8a0533ee166cc20fe80bc

    • SHA256

      ab2cc2ce9715dbf7ead7ab7e897ae983acda37601d6e5064ba245c804f082167

    • SHA512

      3894d775fcb0b40bec8ae92eea3ddc166bb69d0022f4cb243d482637f30c9e807ff4437744525aa57ac07191777c78786f6ee846a0b26eb25f333f7133934ed9

    • SSDEEP

      12288:hkb9GREILTZvK6513vCe+i2Ps7KagZTE+jX/ReTPVQ:mUREaNh3/+bk0ZTE+rUdQ

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Discovery

System Information Discovery

1
T1082

Collection

Email Collection

1
T1114

Tasks