General
-
Target
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0
-
Size
552KB
-
Sample
220310-vrm8pahcb2
-
MD5
8e677a902c0aa53ab104797c22502902
-
SHA1
72ed219b7d1a45a979ad309cf60ee3d66529e96a
-
SHA256
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0
-
SHA512
62ebd6afcd08d92564fb3d1a8a072fb99a68b90b511927e997379a81a5cdb43e2cafad2f7a1052c7b70c14bb52d4a23701361da2da0980e1a85d080ddf5ff5da
Static task
static1
Behavioral task
behavioral1
Sample
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0
-
Size
552KB
-
MD5
8e677a902c0aa53ab104797c22502902
-
SHA1
72ed219b7d1a45a979ad309cf60ee3d66529e96a
-
SHA256
5617d51aa020250f69aab4cb3fd4a52efc1dda4367302e3f3f069b117cb948e0
-
SHA512
62ebd6afcd08d92564fb3d1a8a072fb99a68b90b511927e997379a81a5cdb43e2cafad2f7a1052c7b70c14bb52d4a23701361da2da0980e1a85d080ddf5ff5da
Score6/10-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-