Static task
static1
Behavioral task
behavioral1
Sample
8cc38b5cfee782b2b146dd991ca3d5569a061d3e6dc9cf603857d1cd07cdba10.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8cc38b5cfee782b2b146dd991ca3d5569a061d3e6dc9cf603857d1cd07cdba10.exe
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
8cc38b5cfee782b2b146dd991ca3d5569a061d3e6dc9cf603857d1cd07cdba10
-
Size
553KB
-
MD5
89bab612c085ee6b1baade1c33d5ce00
-
SHA1
5f1b9a06f51545726dc832e9b3b2bb1f52c173ef
-
SHA256
8cc38b5cfee782b2b146dd991ca3d5569a061d3e6dc9cf603857d1cd07cdba10
-
SHA512
cf258f9efd4e1960714c620c9f794a9b703f5317986391ee6f18ef0025ef96a4c9747836986f432bdb81ba9114dd88fc310bc4546860b3ff3ad96c9cf554317c
Score
10/10
Malware Config
Extracted
Family
hawkeye_reborn
Attributes
- fields
- name
Signatures
-
Hawkeye_reborn family
-
M00nD3v Logger Payload 1 IoCs
Detects M00nD3v Logger payload in memory.
Processes:
resource yara_rule sample m00nd3v_logger -
M00nd3v_logger family
Files
-
8cc38b5cfee782b2b146dd991ca3d5569a061d3e6dc9cf603857d1cd07cdba10.exe windows x86