General
-
Target
71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06
-
Size
552KB
-
Sample
220310-bjpxrsfbhq
-
MD5
cb54538b9db0e01d64b39ffaae86c500
-
SHA1
23687f646854aeccacb79197eac450dc0524969d
-
SHA256
71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06
-
SHA512
9dc6e512af7f715ffbdedccf888b3299e59c669bb795cc1a9cf9c269bbe2d3f83678cf695450c32306259903fed0768ab76102ae920497810eaacc45a4884032
Static task
static1
Behavioral task
behavioral1
Sample
71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06
-
Size
552KB
-
MD5
cb54538b9db0e01d64b39ffaae86c500
-
SHA1
23687f646854aeccacb79197eac450dc0524969d
-
SHA256
71f21a8a99531d38cefedb69301de5390e0127ca1fdb2fa1ece07433ef358e06
-
SHA512
9dc6e512af7f715ffbdedccf888b3299e59c669bb795cc1a9cf9c269bbe2d3f83678cf695450c32306259903fed0768ab76102ae920497810eaacc45a4884032
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-