General
-
Target
5a856d743bad4ceb35ef2aa7fa4239098f35c001a4d10b05b0bdd604fa49f3e7
-
Size
1.2MB
-
Sample
220802-dsq8ashhdn
-
MD5
5b4b715c551523a3acb4d7a5fae1ee51
-
SHA1
38fa7c681eb3a1c054afa9d403e0d14dfadad5fd
-
SHA256
5a856d743bad4ceb35ef2aa7fa4239098f35c001a4d10b05b0bdd604fa49f3e7
-
SHA512
d28dd6bf68261ae1b331be0c62c422ae7a487036c48b3879aa213e063606bb6294dc4a89cb3ec2adf3737d7821b8aa996df63672785c3b77fb02d841aee3a286
Static task
static1
Behavioral task
behavioral1
Sample
5a856d743bad4ceb35ef2aa7fa4239098f35c001a4d10b05b0bdd604fa49f3e7.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
5a856d743bad4ceb35ef2aa7fa4239098f35c001a4d10b05b0bdd604fa49f3e7.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
5a856d743bad4ceb35ef2aa7fa4239098f35c001a4d10b05b0bdd604fa49f3e7
-
Size
1.2MB
-
MD5
5b4b715c551523a3acb4d7a5fae1ee51
-
SHA1
38fa7c681eb3a1c054afa9d403e0d14dfadad5fd
-
SHA256
5a856d743bad4ceb35ef2aa7fa4239098f35c001a4d10b05b0bdd604fa49f3e7
-
SHA512
d28dd6bf68261ae1b331be0c62c422ae7a487036c48b3879aa213e063606bb6294dc4a89cb3ec2adf3737d7821b8aa996df63672785c3b77fb02d841aee3a286
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-