General

  • Target

    1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7

  • Size

    1.2MB

  • Sample

    220608-e2sm6ahbel

  • MD5

    2475fda58a0ac4c571deb76001a6d81d

  • SHA1

    f1a74f6500a64bcc2ae2a5c15d59bd96f43dd115

  • SHA256

    1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7

  • SHA512

    65e9e5d482ed5d4d68284756639265a7802f455238f9e750175ba43b5f9ba404122cc840c10da94c9416a6c4bd2ecb1da8722ba456a6bca5365bd4d9c659f940

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7

    • Size

      1.2MB

    • MD5

      2475fda58a0ac4c571deb76001a6d81d

    • SHA1

      f1a74f6500a64bcc2ae2a5c15d59bd96f43dd115

    • SHA256

      1a13578cce30300c8468be6adaf29fba9282e3267555a26876bedbb4695bd6f7

    • SHA512

      65e9e5d482ed5d4d68284756639265a7802f455238f9e750175ba43b5f9ba404122cc840c10da94c9416a6c4bd2ecb1da8722ba456a6bca5365bd4d9c659f940

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger Payload

      Detects M00nD3v Logger payload in memory.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks