General
-
Target
a0f4a5d94ba4ada8aa8707f663e4dec69c095f945f662d269e7f5b5795cd160b
-
Size
552KB
-
Sample
220312-d3m9dsaabp
-
MD5
2358efde4743bce80de99414e15b5f80
-
SHA1
c97d7b29cfbc18624638f7524850298e3ddfc20a
-
SHA256
a0f4a5d94ba4ada8aa8707f663e4dec69c095f945f662d269e7f5b5795cd160b
-
SHA512
94499bf58e1ad3177860359e5dc909a0c1f43fbb38cdf979d333f1010fa5c5fa3a4691d0ac7f6b98d9fd78a24b3f5ada5d6358703bd5816beb5dd10ca4e41c86
Static task
static1
Behavioral task
behavioral1
Sample
a0f4a5d94ba4ada8aa8707f663e4dec69c095f945f662d269e7f5b5795cd160b.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
a0f4a5d94ba4ada8aa8707f663e4dec69c095f945f662d269e7f5b5795cd160b.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
a0f4a5d94ba4ada8aa8707f663e4dec69c095f945f662d269e7f5b5795cd160b
-
Size
552KB
-
MD5
2358efde4743bce80de99414e15b5f80
-
SHA1
c97d7b29cfbc18624638f7524850298e3ddfc20a
-
SHA256
a0f4a5d94ba4ada8aa8707f663e4dec69c095f945f662d269e7f5b5795cd160b
-
SHA512
94499bf58e1ad3177860359e5dc909a0c1f43fbb38cdf979d333f1010fa5c5fa3a4691d0ac7f6b98d9fd78a24b3f5ada5d6358703bd5816beb5dd10ca4e41c86
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-