General

  • Target

    56ac3350eb5e17ea5fb0a3018db0b6cfd3ae40dba2b12c1c8e70ca7ef407b38d

  • Size

    783KB

  • Sample

    220725-cgp1esabg5

  • MD5

    63e9deac74a65e00c0c75dce31676601

  • SHA1

    6876c5e36a85aa066370fc417be0703b88bbdb9a

  • SHA256

    56ac3350eb5e17ea5fb0a3018db0b6cfd3ae40dba2b12c1c8e70ca7ef407b38d

  • SHA512

    56fce3eb77f81edc8bf4e7b3038fb63bf9abce5a07fe3a869fe3a60266e74523026ce01f369570b328745ea8d1e8db14dd73c29e1b94af00c1fe6fe1471af2df

Malware Config

Extracted

Family

hawkeye_reborn

Version

9.0.1.6

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.lycos.com
  • Port:
    587
  • Username:
    operations@tms-tamkers.com
  • Password:
    subjected1
Mutex

c0598697-7482-4f6c-84b0-384a27d361b0

Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:subjected1 _EmailPort:587 _EmailSSL:true _EmailServer:smtp.lycos.com _EmailUsername:operations@tms-tamkers.com _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:c0598697-7482-4f6c-84b0-384a27d361b0 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:9.0.1.6 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye Keylogger - Reborn v9, Version=9.0.1.6, Culture=neutral, PublicKeyToken=null

Targets

    • Target

      56ac3350eb5e17ea5fb0a3018db0b6cfd3ae40dba2b12c1c8e70ca7ef407b38d

    • Size

      783KB

    • MD5

      63e9deac74a65e00c0c75dce31676601

    • SHA1

      6876c5e36a85aa066370fc417be0703b88bbdb9a

    • SHA256

      56ac3350eb5e17ea5fb0a3018db0b6cfd3ae40dba2b12c1c8e70ca7ef407b38d

    • SHA512

      56fce3eb77f81edc8bf4e7b3038fb63bf9abce5a07fe3a869fe3a60266e74523026ce01f369570b328745ea8d1e8db14dd73c29e1b94af00c1fe6fe1471af2df

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.