General

  • Target

    861323785237f36e8d9ee99d2dd2f8e7030adae5ee2413e47f5cc6fa51af097c

  • Size

    2.0MB

  • Sample

    220724-sw1cpshac5

  • MD5

    f8cc934d918c21b38eb6f27ae2aaa244

  • SHA1

    b0c000fa26ce9d08229bb6ba803c58be2d858dc8

  • SHA256

    861323785237f36e8d9ee99d2dd2f8e7030adae5ee2413e47f5cc6fa51af097c

  • SHA512

    eade70e20f0dce2eff066b8e4b2a2f683e310e8af32681228f37e1fa69c8e1ffef933eacdece3e6823195da1c002d5a5aad81e3c323aa4b126e6aa81f24a9f7f

Malware Config

Extracted

Family

hawkeye_reborn

Version

10.0.0.0

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ancopottary.com
  • Port:
    587
  • Username:
    collins@ancopottary.com
  • Password:
    niconpay$
Mutex

6814063d-6af8-47ff-b616-e3c11999f719

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:true _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:niconpay$ _EmailPort:587 _EmailSSL:true _EmailServer:mail.ancopottary.com _EmailUsername:collins@ancopottary.com _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:6814063d-6af8-47ff-b616-e3c11999f719 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:true _Version:10.0.0.0 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye RebornX, Version=10.0.0.0, Culture=neutral, PublicKeyToken=null

Targets

    • Target

      861323785237f36e8d9ee99d2dd2f8e7030adae5ee2413e47f5cc6fa51af097c

    • Size

      2.0MB

    • MD5

      f8cc934d918c21b38eb6f27ae2aaa244

    • SHA1

      b0c000fa26ce9d08229bb6ba803c58be2d858dc8

    • SHA256

      861323785237f36e8d9ee99d2dd2f8e7030adae5ee2413e47f5cc6fa51af097c

    • SHA512

      eade70e20f0dce2eff066b8e4b2a2f683e310e8af32681228f37e1fa69c8e1ffef933eacdece3e6823195da1c002d5a5aad81e3c323aa4b126e6aa81f24a9f7f

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • Sets file execution options in registry

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks