General

  • Target

    49d8de48a786e6eb124f7f85ee54de73a9329c536555d2255fcabcc5c5ee48da

  • Size

    1.2MB

  • Sample

    220712-styfbsfhgr

  • MD5

    ff40dc188d764f636326d86be20489d1

  • SHA1

    bb10ff991ae221354a1a9a5698fd6b73c24e1836

  • SHA256

    49d8de48a786e6eb124f7f85ee54de73a9329c536555d2255fcabcc5c5ee48da

  • SHA512

    88561fa4d62aa72be0a1da37c3d7594790461241c574dba2c7b88db044315e4e4207a3e15522a689b95bded6f77498f2994d3b09bb7fd3cfe6971b94d5fb32f3

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      required89929920200.exe

    • Size

      1.3MB

    • MD5

      d95dad4b055594d2bb0a33fb96a72fb4

    • SHA1

      18c95e82c43fe78fd9685f165acda3e3b9963795

    • SHA256

      d1050ecae55aa83cfdaf595b29e3028d0a5964aa8f285e92d8a980f001d33169

    • SHA512

      131e61ed8312737d2100d343bb5418ba430983faaf49592095f739525020e01a866f06b0624e19c7f8f1a271fd5368c206169593a61da1afad88d6a0e020193e

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks