General
-
Target
be45c7c50188ef8b32ad85371e15796fbcf391c1140c57b0ddc87346c376b47a
-
Size
556KB
-
Sample
220314-s75rkabcer
-
MD5
a00f95e5954c3f6bf27f166cf268c077
-
SHA1
93b270716fc487a77a0ce25636d36dc68cc95981
-
SHA256
be45c7c50188ef8b32ad85371e15796fbcf391c1140c57b0ddc87346c376b47a
-
SHA512
21944e219f6ab75d66f0aa200f2dbb4dbd982cd10dd490f18d7b947578a1b507ec0260833464dba51c2e6f46c1022fa8f1d4527920739f630a23cc9e211d8e99
Static task
static1
Behavioral task
behavioral1
Sample
be45c7c50188ef8b32ad85371e15796fbcf391c1140c57b0ddc87346c376b47a.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
be45c7c50188ef8b32ad85371e15796fbcf391c1140c57b0ddc87346c376b47a.exe
Resource
win10v2004-20220310-en
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
be45c7c50188ef8b32ad85371e15796fbcf391c1140c57b0ddc87346c376b47a
-
Size
556KB
-
MD5
a00f95e5954c3f6bf27f166cf268c077
-
SHA1
93b270716fc487a77a0ce25636d36dc68cc95981
-
SHA256
be45c7c50188ef8b32ad85371e15796fbcf391c1140c57b0ddc87346c376b47a
-
SHA512
21944e219f6ab75d66f0aa200f2dbb4dbd982cd10dd490f18d7b947578a1b507ec0260833464dba51c2e6f46c1022fa8f1d4527920739f630a23cc9e211d8e99
Score9/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-