General
-
Target
212863825347d7ca40ece1790be931dbb9f511f81696ea498d92c550929a476f
-
Size
690KB
-
Sample
220612-lfrmasbeg4
-
MD5
afbc0e57d96b878874b518492453222a
-
SHA1
df4c16429fb1719cdee60cdc691797af0e8739aa
-
SHA256
212863825347d7ca40ece1790be931dbb9f511f81696ea498d92c550929a476f
-
SHA512
3d4724aa2da5916a7cdfcf1c750028fe4f30f94a30b58e51c3d00ed893f9e40cebabd6ff63ea722a8b9337868d3a23fcf4e1e2ddc58cc51c87048596c511d718
Static task
static1
Behavioral task
behavioral1
Sample
ktrazuaohhbo7kc.msi
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ktrazuaohhbo7kc.msi
Resource
win10v2004-20220414-en
Malware Config
Extracted
hawkeye_reborn
9.0.1.6
Protocol: smtp- Host:
mail.patrogabon.com - Port:
587 - Username:
[email protected] - Password:
PyAF1VMa~s5;
fde0218e-5e9c-462f-b529-a61f688a2e66
-
fields
map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:PyAF1VMa~s5; _EmailPort:587 _EmailSSL:true _EmailServer:mail.patrogabon.com _EmailUsername:[email protected] _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:fde0218e-5e9c-462f-b529-a61f688a2e66 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:9.0.1.6 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]
-
name
HawkEye Keylogger - Reborn v9, Version=9.0.1.6, Culture=neutral, PublicKeyToken=null
Targets
-
-
Target
ktrazuaohhbo7kc.msi
-
Size
1.0MB
-
MD5
516b891e8e0dd965e27d87552070deaf
-
SHA1
45d53c2fe685c953cf1a18e4fb9b96ab0d480682
-
SHA256
74f05574ba23c3e43d28a4d1adec713cfada1bdd01648bcbd16418a87ad91a37
-
SHA512
4a7f16a5032acc6df9e241b53c1c43798dff0b04f1e5eb8d4fb78d57ccf6916d108c903b0e9634555c1dc6cec8b947d64b27d98c28b225ae81847474037418a9
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Looks for VirtualBox Guest Additions in registry
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-