Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
10-03-2022 04:59
Static task
static1
Behavioral task
behavioral1
Sample
64baea6c193db9e41ef617f86cd77599eaf06fa8054e362051b98147ed5abdb3.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
64baea6c193db9e41ef617f86cd77599eaf06fa8054e362051b98147ed5abdb3.exe
Resource
win10v2004-en-20220113
General
-
Target
64baea6c193db9e41ef617f86cd77599eaf06fa8054e362051b98147ed5abdb3.exe
-
Size
404KB
-
MD5
a77c2cd87f4f064352854ff7851a89a3
-
SHA1
cf93d35e504bb1af5bf2faa2281726e541e98c82
-
SHA256
64baea6c193db9e41ef617f86cd77599eaf06fa8054e362051b98147ed5abdb3
-
SHA512
0c91d8646007796839bbd73eef95b60f49bd7308a313d00f852a5e7defaa8d5bf9b59461b7968daf06071f09134f9345b87c4ca0cb289ecdd5efd1214983b8e7
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Signatures
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Processes:
resource yara_rule behavioral2/memory/3264-130-0x0000000000BE0000-0x0000000000C70000-memory.dmp m00nd3v_logger behavioral2/memory/3264-131-0x0000000000BE0000-0x0000000000C70000-memory.dmp m00nd3v_logger