General

  • Target

    0647075334a86764440847c4a96f489308de78cc3b7ce4ac935c12681ec5d5bf

  • Size

    986KB

  • Sample

    220531-hcprrahcc8

  • MD5

    45dd85c126af01c7e0a4d68a11b860dd

  • SHA1

    62b3ec81fe6b2e9a8d1b2b3946997569328d878b

  • SHA256

    0647075334a86764440847c4a96f489308de78cc3b7ce4ac935c12681ec5d5bf

  • SHA512

    8cfb49dfb56ce81cb98025bc9353535514d64702126686a2db8bf695977d6b66f8dbcff5bd76a82498918bbd16d749934d3b0014a779eb8f8890d6ab5c9d572c

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      0647075334a86764440847c4a96f489308de78cc3b7ce4ac935c12681ec5d5bf

    • Size

      986KB

    • MD5

      45dd85c126af01c7e0a4d68a11b860dd

    • SHA1

      62b3ec81fe6b2e9a8d1b2b3946997569328d878b

    • SHA256

      0647075334a86764440847c4a96f489308de78cc3b7ce4ac935c12681ec5d5bf

    • SHA512

      8cfb49dfb56ce81cb98025bc9353535514d64702126686a2db8bf695977d6b66f8dbcff5bd76a82498918bbd16d749934d3b0014a779eb8f8890d6ab5c9d572c

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger Payload

      Detects M00nD3v Logger payload in memory.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks