General
-
Target
59ef5b795db30415b8b7cd21b186105e70a71f5e21bf1d2224ca5e6b58145e70
-
Size
552KB
-
Sample
220310-s26rnsgee2
-
MD5
42972a9a5ab46a5dcc9e72389c069db7
-
SHA1
53db1c679729bafccbcb35c64ca7f3e04aa7d9d8
-
SHA256
59ef5b795db30415b8b7cd21b186105e70a71f5e21bf1d2224ca5e6b58145e70
-
SHA512
26b1ccfe16ec9c25a878573896ee6afffdc150376b18857b3a45e03db67add767b065d6b03806c7692388100b23186d0ca2483f9514daad5a51c9dcce608d025
Static task
static1
Behavioral task
behavioral1
Sample
59ef5b795db30415b8b7cd21b186105e70a71f5e21bf1d2224ca5e6b58145e70.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
59ef5b795db30415b8b7cd21b186105e70a71f5e21bf1d2224ca5e6b58145e70.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
59ef5b795db30415b8b7cd21b186105e70a71f5e21bf1d2224ca5e6b58145e70
-
Size
552KB
-
MD5
42972a9a5ab46a5dcc9e72389c069db7
-
SHA1
53db1c679729bafccbcb35c64ca7f3e04aa7d9d8
-
SHA256
59ef5b795db30415b8b7cd21b186105e70a71f5e21bf1d2224ca5e6b58145e70
-
SHA512
26b1ccfe16ec9c25a878573896ee6afffdc150376b18857b3a45e03db67add767b065d6b03806c7692388100b23186d0ca2483f9514daad5a51c9dcce608d025
Score8/10-
Sets file execution options in registry
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-