General

  • Target

    f298bfeead320b32fecc3e5e17b2e5e18c333637ed04a8df4008aad859d89dfd

  • Size

    1.3MB

  • Sample

    220725-em2mhseban

  • MD5

    c33b87f51e555f1e5317293e4a34049e

  • SHA1

    7ad16a1923c1f0298dee9bd997dbec09087938ed

  • SHA256

    f298bfeead320b32fecc3e5e17b2e5e18c333637ed04a8df4008aad859d89dfd

  • SHA512

    aed563dd5f20ba822497ba2e5cb92b15509b66971a2dc01805c0a1e2b4d3c4590766891f2080bc3a11b96fd5d41204d29795534114d5591ab040082013226409

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      f298bfeead320b32fecc3e5e17b2e5e18c333637ed04a8df4008aad859d89dfd

    • Size

      1.3MB

    • MD5

      c33b87f51e555f1e5317293e4a34049e

    • SHA1

      7ad16a1923c1f0298dee9bd997dbec09087938ed

    • SHA256

      f298bfeead320b32fecc3e5e17b2e5e18c333637ed04a8df4008aad859d89dfd

    • SHA512

      aed563dd5f20ba822497ba2e5cb92b15509b66971a2dc01805c0a1e2b4d3c4590766891f2080bc3a11b96fd5d41204d29795534114d5591ab040082013226409

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks