General

  • Target

    6ed637be685ed4dc0d6770f47b922ae46ed80795a2fc5dac60b8dd7ff14605ac

  • Size

    1.2MB

  • Sample

    230222-sr2pzacc58

  • MD5

    8c719a5b484d3320606684e6371e43bd

  • SHA1

    35978c2a42fd9213fbe2c228e9e6bc6a754db8bd

  • SHA256

    6ed637be685ed4dc0d6770f47b922ae46ed80795a2fc5dac60b8dd7ff14605ac

  • SHA512

    cb038a2da37acb74774bcd36f826183499bfd7addd30610eee9cee3ff657606da2d4f557bad50d07c1b41d2b4c8ebeb19e3b82907bfe1bd2c4a3ecc455ee05d1

  • SSDEEP

    24576:VnOTsIBMNjnNNOhAe/S0nj1FSQNvA0vZCR7YKRf2KMt7b9TqDgCQNuYNcWreDui3:Ou0vYReKMtPxq0CuRNcWr+wA

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.brado-it.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    wKqTRDAW8B%F

Targets

    • Target

      6ed637be685ed4dc0d6770f47b922ae46ed80795a2fc5dac60b8dd7ff14605ac

    • Size

      1.2MB

    • MD5

      8c719a5b484d3320606684e6371e43bd

    • SHA1

      35978c2a42fd9213fbe2c228e9e6bc6a754db8bd

    • SHA256

      6ed637be685ed4dc0d6770f47b922ae46ed80795a2fc5dac60b8dd7ff14605ac

    • SHA512

      cb038a2da37acb74774bcd36f826183499bfd7addd30610eee9cee3ff657606da2d4f557bad50d07c1b41d2b4c8ebeb19e3b82907bfe1bd2c4a3ecc455ee05d1

    • SSDEEP

      24576:VnOTsIBMNjnNNOhAe/S0nj1FSQNvA0vZCR7YKRf2KMt7b9TqDgCQNuYNcWreDui3:Ou0vYReKMtPxq0CuRNcWr+wA

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks