General

  • Target

    612d970b264afbea7c98dea5d7be82c982b218be0f95cbb82aca89eebf754359

  • Size

    1.4MB

  • Sample

    220730-1t3n2shhe6

  • MD5

    bf8f74eb5dee1bb05729a4092481f8c5

  • SHA1

    b78641682de541b52ddc277e317432d904453e82

  • SHA256

    612d970b264afbea7c98dea5d7be82c982b218be0f95cbb82aca89eebf754359

  • SHA512

    17f06d41247f979f8bdb8fd22367b377233fb59a594affd5ddd47dfcff8faa2aa4e67e4e7005427a1a6712ad8766d2fa805111ef463bb90fd771d68e37ef0751

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Targets

    • Target

      612d970b264afbea7c98dea5d7be82c982b218be0f95cbb82aca89eebf754359

    • Size

      1.4MB

    • MD5

      bf8f74eb5dee1bb05729a4092481f8c5

    • SHA1

      b78641682de541b52ddc277e317432d904453e82

    • SHA256

      612d970b264afbea7c98dea5d7be82c982b218be0f95cbb82aca89eebf754359

    • SHA512

      17f06d41247f979f8bdb8fd22367b377233fb59a594affd5ddd47dfcff8faa2aa4e67e4e7005427a1a6712ad8766d2fa805111ef463bb90fd771d68e37ef0751

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks