General

  • Target

    4d9d802de273d132846db610fa7ee558e8c7af19ceb1aa84fa22789664a2f2fb

  • Size

    985KB

  • Sample

    220720-za79raagan

  • MD5

    d6aa101b1b18175f70c4a4c314f4998b

  • SHA1

    43c77052d7fe5e6fdc9eea2bcba82dfc852920b5

  • SHA256

    4d9d802de273d132846db610fa7ee558e8c7af19ceb1aa84fa22789664a2f2fb

  • SHA512

    3483af9285410eda1a0063ea08864aedbf18fee8df542fb63efbe42d1f28b4d27f774fa89529ef1ca056180f604c690ba50ceedda392805fe58165962fd00355

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      4d9d802de273d132846db610fa7ee558e8c7af19ceb1aa84fa22789664a2f2fb

    • Size

      985KB

    • MD5

      d6aa101b1b18175f70c4a4c314f4998b

    • SHA1

      43c77052d7fe5e6fdc9eea2bcba82dfc852920b5

    • SHA256

      4d9d802de273d132846db610fa7ee558e8c7af19ceb1aa84fa22789664a2f2fb

    • SHA512

      3483af9285410eda1a0063ea08864aedbf18fee8df542fb63efbe42d1f28b4d27f774fa89529ef1ca056180f604c690ba50ceedda392805fe58165962fd00355

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks