General
-
Target
5751744955973632.zip.zip
-
Size
790KB
-
Sample
210721-vqdytnhwk2
-
MD5
6c755db3e9cfec6e565036a0cafda04e
-
SHA1
7f92af5c2056947c1a433aa8f0201a94bdeaf13f
-
SHA256
b98dcc8c36a2684b5949373d521d4d90139d44d912e81f2e69797b485d7f0801
-
SHA512
fcfa4844929dd55c3491054433d388a86eabd486a22c222bef19f91ba7c92a48ab37423428309f180a2c7b5c6d18a6fa6484555b5f1a3165d73041c7e25ee748
Static task
static1
Behavioral task
behavioral1
Sample
cbf5be2bd3f2d0d5bc495228c034d303d728c11b6bbf58cdcf313c6bf7321321.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
cbf5be2bd3f2d0d5bc495228c034d303d728c11b6bbf58cdcf313c6bf7321321.exe
Resource
win10v20210408
Malware Config
Extracted
hawkeye_reborn
10.1.0.0
Protocol: smtp- Host:
mail.shreejitransport.com - Port:
587 - Username:
mumbai@shreejitransport.com - Password:
mumbai@333
f134bda4-4dab-4acb-96d8-2f9c501e2086
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:mumbai@333 _EmailPort:587 _EmailSSL:true _EmailServer:mail.shreejitransport.com _EmailUsername:mumbai@shreejitransport.com _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:f134bda4-4dab-4acb-96d8-2f9c501e2086 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:10.1.0.0 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - RebornX, Version=10.1.0.0, Culture=neutral, PublicKeyToken=null
Extracted
Protocol: smtp- Host:
mail.shreejitransport.com - Port:
587 - Username:
mumbai@shreejitransport.com - Password:
mumbai@333
Targets
-
-
Target
cbf5be2bd3f2d0d5bc495228c034d303d728c11b6bbf58cdcf313c6bf7321321
-
Size
835KB
-
MD5
7eb59bca0718b3881acb345119584bdd
-
SHA1
248eaacb105c8e343df5c90dea3d6e14f0b1b5b6
-
SHA256
cbf5be2bd3f2d0d5bc495228c034d303d728c11b6bbf58cdcf313c6bf7321321
-
SHA512
6930efdd75648007353e495384974e775e6a85ef49efaa2a8e64bf1ea6e5b8cf30bdbce7f45593fb5049bc9278f9f21e4825cc542be079ca05c9fae11c4c2fe9
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
M00nD3v Logger Payload
Detects M00nD3v Logger payload in memory.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-