General
-
Target
9c04b7ba30ba22c5f878d23b29f6fd492a5bfa6da831ef0707cc73908cda3988
-
Size
552KB
-
Sample
220312-fmcttsfgf2
-
MD5
2161bf50926660d37a76f6700c3b49f8
-
SHA1
745bbe9768125245d64f250cb16f63327f8e0240
-
SHA256
9c04b7ba30ba22c5f878d23b29f6fd492a5bfa6da831ef0707cc73908cda3988
-
SHA512
c0d7f5ca70bc5aed35f00cc5df37160f5a370dc280c54604e22a607ecb9158b5306f45593a350b43cc44d94dd7ee5406a1ea5f87aebbea485c48417cfed4b75c
Static task
static1
Behavioral task
behavioral1
Sample
9c04b7ba30ba22c5f878d23b29f6fd492a5bfa6da831ef0707cc73908cda3988.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
9c04b7ba30ba22c5f878d23b29f6fd492a5bfa6da831ef0707cc73908cda3988.exe
Resource
win10v2004-en-20220113
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
9c04b7ba30ba22c5f878d23b29f6fd492a5bfa6da831ef0707cc73908cda3988
-
Size
552KB
-
MD5
2161bf50926660d37a76f6700c3b49f8
-
SHA1
745bbe9768125245d64f250cb16f63327f8e0240
-
SHA256
9c04b7ba30ba22c5f878d23b29f6fd492a5bfa6da831ef0707cc73908cda3988
-
SHA512
c0d7f5ca70bc5aed35f00cc5df37160f5a370dc280c54604e22a607ecb9158b5306f45593a350b43cc44d94dd7ee5406a1ea5f87aebbea485c48417cfed4b75c
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-