General
-
Target
#0034004 SHIPPING ITEMS LISTED pdf.exe
-
Size
1.1MB
-
Sample
200314-tsgk3qqp22
-
MD5
909fc4fc06c72165829eb0dc45ec6fa2
-
SHA1
87673992368f3db1a973c1d1f04bd11eecbf8470
-
SHA256
ffe06faf3552c18f24916d1068805503c668c7cc34e9fd90266d04571c6ad94a
-
SHA512
336ca81a032fa11c992cc25bd74b269b14ec092e2fa23df9d534006ec19441bde8862a3789782fd7121c3a43a8dd3ee5fc76654de6cba8d1d7847ec940fff8cb
Static task
static1
Behavioral task
behavioral1
Sample
#0034004 SHIPPING ITEMS LISTED pdf.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
#0034004 SHIPPING ITEMS LISTED pdf.exe
Resource
win10v200217
Malware Config
Targets
-
-
Target
#0034004 SHIPPING ITEMS LISTED pdf.exe
-
Size
1.1MB
-
MD5
909fc4fc06c72165829eb0dc45ec6fa2
-
SHA1
87673992368f3db1a973c1d1f04bd11eecbf8470
-
SHA256
ffe06faf3552c18f24916d1068805503c668c7cc34e9fd90266d04571c6ad94a
-
SHA512
336ca81a032fa11c992cc25bd74b269b14ec092e2fa23df9d534006ec19441bde8862a3789782fd7121c3a43a8dd3ee5fc76654de6cba8d1d7847ec940fff8cb
Score10/10-
HawkEye Reborn
HawkEye Reborn is an enchanced version of the HawkEye malware kit.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-