General
-
Target
af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b
-
Size
556KB
-
Sample
220311-22v5lscdc8
-
MD5
66c4a1199972a1712996ef9c09048124
-
SHA1
9a7a183e8be933d5b10512a00d21a94499cb5116
-
SHA256
af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b
-
SHA512
ca5e2ab7b4977e310912bc874fdbe500bdac53cf3f2fe94cfd3ada1f2e7cb77393751ec51707e4675869979633179483204ff91caba56f1ef2974754f350bc8f
Static task
static1
Behavioral task
behavioral1
Sample
af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b
-
Size
556KB
-
MD5
66c4a1199972a1712996ef9c09048124
-
SHA1
9a7a183e8be933d5b10512a00d21a94499cb5116
-
SHA256
af6d44dfa7faec24f0cfd2da5d6afbf50c25d85c02af6dcd816c224d1198651b
-
SHA512
ca5e2ab7b4977e310912bc874fdbe500bdac53cf3f2fe94cfd3ada1f2e7cb77393751ec51707e4675869979633179483204ff91caba56f1ef2974754f350bc8f
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Sets file execution options in registry
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-