General
-
Target
ae41668b1efcfcb42794f2110f208b68265a5e2258102a5d84e9d067c6b6e3cf
-
Size
695KB
-
Sample
220205-ng4pcsaha2
-
MD5
ccb40bb8c927537601e0799912d7189b
-
SHA1
d7724adc9b905bcd9ad887aaf6de6a0722ca3fcb
-
SHA256
ae41668b1efcfcb42794f2110f208b68265a5e2258102a5d84e9d067c6b6e3cf
-
SHA512
11979e9e4d49e0650a439dea56da11c5998bbba5438094256dc033d46f4dd3e1c68bfed5fec3dbef86027c8cb343791b40d5ff567ef7a46059a3a55fdcf24f21
Static task
static1
Behavioral task
behavioral1
Sample
PRODUCT ENQUIRY LIST PO#0007865243482987267 ,pdf.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
PRODUCT ENQUIRY LIST PO#0007865243482987267 ,pdf.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
10.1.2.2
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
billions77m$
29fd8e2e-a219-468b-b1a2-4de6da722695
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:false _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:billions77m$ _EmailPort:587 _EmailSSL:true _EmailServer:smtp.yandex.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:false _LogInterval:10 _MeltFile:false _Mutex:29fd8e2e-a219-468b-b1a2-4de6da722695 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:10.1.2.2 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - RebornX, Version=10.1.2.2, Culture=neutral, PublicKeyToken=null
Targets
-
-
Target
PRODUCT ENQUIRY LIST PO#0007865243482987267 ,pdf.exe
-
Size
953KB
-
MD5
a2a48069e7778fb2ad1b4a757eaa9d50
-
SHA1
d7d759a032acabaa9e5a53727e4d951ad6270d1b
-
SHA256
8ab45eb97285241116fb268afc0a0e594ac04f29f32cd62a659447a0b14e3c37
-
SHA512
c0ce9b2cfa6a21cada3292b4eca59de4f76f2b085e6955bd176e2937b04decbed224c781f4e98c2c94bb513703195984f61d895d1c353218a9cdb3ceb7aa8133
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
M00nD3v Logger Payload
Detects M00nD3v Logger payload in memory.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-