General

  • Target

    0ec08ef4ed20233f9ea31687e2f8bb35ba3cdfbb8ccd0aeac1060ebcbe9873b7

  • Size

    552KB

  • Sample

    220222-x335dseabn

  • MD5

    57fee168385ff171170b6582be68c824

  • SHA1

    52993375265f5fc003618e8ef7e644b407a16342

  • SHA256

    0ec08ef4ed20233f9ea31687e2f8bb35ba3cdfbb8ccd0aeac1060ebcbe9873b7

  • SHA512

    311914d06ae105428bc386884c203dd6dd62f25493bdf6d38cc02b993c59d9b4546599d973e2bfa87cb7331d2e7fa24160db786b113df54d95767e3d1bb1d4be

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      0ec08ef4ed20233f9ea31687e2f8bb35ba3cdfbb8ccd0aeac1060ebcbe9873b7

    • Size

      552KB

    • MD5

      57fee168385ff171170b6582be68c824

    • SHA1

      52993375265f5fc003618e8ef7e644b407a16342

    • SHA256

      0ec08ef4ed20233f9ea31687e2f8bb35ba3cdfbb8ccd0aeac1060ebcbe9873b7

    • SHA512

      311914d06ae105428bc386884c203dd6dd62f25493bdf6d38cc02b993c59d9b4546599d973e2bfa87cb7331d2e7fa24160db786b113df54d95767e3d1bb1d4be

    • Sets file execution options in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks