General

  • Target

    0f128566b7d0c5e39763c471ad46636958bf6ee200690c1a8dd468601fa5e792

  • Size

    3.7MB

  • Sample

    220604-vcem1affd9

  • MD5

    90797230e9e053b254790ac095363e65

  • SHA1

    46137839598f7beb8221c868b4a203d79e294c6f

  • SHA256

    0f128566b7d0c5e39763c471ad46636958bf6ee200690c1a8dd468601fa5e792

  • SHA512

    08ca058e2b9816b5491c145021e0adcdcb8f75ca31c6cac389b12702e27d5879a54fddba9ac7e81f1e7aad5aac2fdbc50ef78166c09195b668c208c1204fc778

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      AWB Number 6789001.exe

    • Size

      3.9MB

    • MD5

      c0fda04886ee7618b7e694c43975ef3d

    • SHA1

      62d2276ed3e79835111e7fb5a455da6ec7fdbdb8

    • SHA256

      6d1d95ed0d6911495c2c91b757fec55f04544ab2ef8baa261be2821231b3aaba

    • SHA512

      492875d54185f3f24a5d34eb6d9a08bac3c6c82fdc07b19df4f238ee6141eb9f6ed87ccee2cd4aecd0de12377bac244ea59e68340d2058cda6cd3251b8d71a94

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger Payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks