General
-
Target
ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238
-
Size
552KB
-
Sample
220311-3r6n2afgfq
-
MD5
d66feb659ac89c7b831de8f4eac2cd00
-
SHA1
7c0df950eb093d252f645c0242f6152fbcdb995c
-
SHA256
ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238
-
SHA512
83b9a3c10acb24c825e807bbe804ad4b09c8789c938a2ec715da43eeb05f251caedc5db8a7f23939449f3e42ef4f90901b4a9f35eb72a7e2922eb9161cb76571
Static task
static1
Behavioral task
behavioral1
Sample
ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238
-
Size
552KB
-
MD5
d66feb659ac89c7b831de8f4eac2cd00
-
SHA1
7c0df950eb093d252f645c0242f6152fbcdb995c
-
SHA256
ad3142f525b156ef2e6f48e383becd51840edf361dbe271c895b98985c648238
-
SHA512
83b9a3c10acb24c825e807bbe804ad4b09c8789c938a2ec715da43eeb05f251caedc5db8a7f23939449f3e42ef4f90901b4a9f35eb72a7e2922eb9161cb76571
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Sets file execution options in registry
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-