General

  • Target

    18f79ddfd56e5beb86dfdd7cf7dfa8a72be614c2a434cd8327a7a487272b1a6d.exe.zip

  • Size

    302KB

  • Sample

    231201-spspaacc88

  • MD5

    74966cdb57c3a98130afe940061d2bec

  • SHA1

    807de3d274204af41be13da2a124acd622076a56

  • SHA256

    c9a312abbd66dde9695cdbc60963b2dd16289538289ba9af0a8d9e2e9c809f71

  • SHA512

    bfc393819088b8ed2c0354bf50e985e493347e5af3d33cc5d137913043f75c6b478b0df6c652ff85faba9b2b7283b2b02adc4fadd9e854e3f5fdf9b0657805f9

  • SSDEEP

    6144:NSE5Tr2uyk1gcBsKKm6lvoHqbe0VCdqEPvd9R6kc+p7mSn8+4WK:NFjyk1BiKru20VCME3d2EmKR4h

Malware Config

Targets

    • Target

      18f79ddfd56e5beb86dfdd7cf7dfa8a72be614c2a434cd8327a7a487272b1a6d.exe

    • Size

      520KB

    • MD5

      014571b0c16311e70b5b1c4cbbd10538

    • SHA1

      c4560dff913b06c78d11ebfb06103b1f0b6fa956

    • SHA256

      18f79ddfd56e5beb86dfdd7cf7dfa8a72be614c2a434cd8327a7a487272b1a6d

    • SHA512

      641745397dcd286c2930cd7dcb72a9bc0a425ec5d496d05aa07096a8100ee65edc14e4afdee4b81b59c33e6b43355956201d3384bd82a86c49da4c48f92b2346

    • SSDEEP

      6144:VuUqg1K6bS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9D:XK6QtqB5urTIoYWBQk1E+VF9mOx9Ui

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks