General
-
Target
57181991527a2320edced68cc6081cf2e1f4501b29a2ad04765a80106125eda3
-
Size
552KB
-
Sample
220310-vhnsvshba4
-
MD5
de3c13f29741e3d91166cabf971dce0a
-
SHA1
6dd4c0e4e20225ab87c0381e64a9642807eee72b
-
SHA256
57181991527a2320edced68cc6081cf2e1f4501b29a2ad04765a80106125eda3
-
SHA512
b5ea4acf271bfdb2fbe34c2c9f3f6b2c66efa64e92229c4c48971682751659441a5af48e4bca7bc511ac1e21772b958c68f34526f5c960bc547bf8e26838360b
Static task
static1
Behavioral task
behavioral1
Sample
57181991527a2320edced68cc6081cf2e1f4501b29a2ad04765a80106125eda3.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
57181991527a2320edced68cc6081cf2e1f4501b29a2ad04765a80106125eda3.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
57181991527a2320edced68cc6081cf2e1f4501b29a2ad04765a80106125eda3
-
Size
552KB
-
MD5
de3c13f29741e3d91166cabf971dce0a
-
SHA1
6dd4c0e4e20225ab87c0381e64a9642807eee72b
-
SHA256
57181991527a2320edced68cc6081cf2e1f4501b29a2ad04765a80106125eda3
-
SHA512
b5ea4acf271bfdb2fbe34c2c9f3f6b2c66efa64e92229c4c48971682751659441a5af48e4bca7bc511ac1e21772b958c68f34526f5c960bc547bf8e26838360b
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-