General
-
Target
384e6e90221ab95f95634da7b74e83cc7f8cff13583b50781a08fe3149273b10
-
Size
552KB
-
Sample
220222-dz2mlscad4
-
MD5
24eca305562ce8bd4f36ac89298175d6
-
SHA1
52526f5c8d2e21c7e7bd1d914bf1fbf11ed88357
-
SHA256
384e6e90221ab95f95634da7b74e83cc7f8cff13583b50781a08fe3149273b10
-
SHA512
dd246df54817d47bd6bdcdaaeae708c9a40f252a350f27932f45c72f8db225baef02bd771835cbf41e4609c78bd4db323eca25e670d3264f335ebe608abe40d7
Static task
static1
Behavioral task
behavioral1
Sample
384e6e90221ab95f95634da7b74e83cc7f8cff13583b50781a08fe3149273b10.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
384e6e90221ab95f95634da7b74e83cc7f8cff13583b50781a08fe3149273b10.exe
Resource
win10v2004-en-20220112
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
384e6e90221ab95f95634da7b74e83cc7f8cff13583b50781a08fe3149273b10
-
Size
552KB
-
MD5
24eca305562ce8bd4f36ac89298175d6
-
SHA1
52526f5c8d2e21c7e7bd1d914bf1fbf11ed88357
-
SHA256
384e6e90221ab95f95634da7b74e83cc7f8cff13583b50781a08fe3149273b10
-
SHA512
dd246df54817d47bd6bdcdaaeae708c9a40f252a350f27932f45c72f8db225baef02bd771835cbf41e4609c78bd4db323eca25e670d3264f335ebe608abe40d7
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-