General
-
Target
c0498d7a70e78c236241d0e91b3bb599c1961ea62a10bd76a16fe7b18824f646
-
Size
526KB
-
Sample
241014-wxw88ashpp
-
MD5
9b6b4686d55afe1479011ee77b5ffb24
-
SHA1
df3cc344a71e5bf855e3bc97b8848eb2daaf8afc
-
SHA256
c0498d7a70e78c236241d0e91b3bb599c1961ea62a10bd76a16fe7b18824f646
-
SHA512
dff029b93178d47a621f637ce82b710412c59784634bad760beaaa5255d7118474fd8f5f903be9ccba623bd3f42de4a06f09fe6f3799a85a8cf692184b346a4e
-
SSDEEP
12288:tUiQnjozy4J/aA/z+DNZFFQ6yunCjo3QkFLcnhpSVfBPp9bJ:yrrstr+JFQ6jFAS
Static task
static1
Behavioral task
behavioral1
Sample
c0498d7a70e78c236241d0e91b3bb599c1961ea62a10bd76a16fe7b18824f646.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0498d7a70e78c236241d0e91b3bb599c1961ea62a10bd76a16fe7b18824f646.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
hawkeye_reborn
- fields
- name
Targets
-
-
Target
c0498d7a70e78c236241d0e91b3bb599c1961ea62a10bd76a16fe7b18824f646
-
Size
526KB
-
MD5
9b6b4686d55afe1479011ee77b5ffb24
-
SHA1
df3cc344a71e5bf855e3bc97b8848eb2daaf8afc
-
SHA256
c0498d7a70e78c236241d0e91b3bb599c1961ea62a10bd76a16fe7b18824f646
-
SHA512
dff029b93178d47a621f637ce82b710412c59784634bad760beaaa5255d7118474fd8f5f903be9ccba623bd3f42de4a06f09fe6f3799a85a8cf692184b346a4e
-
SSDEEP
12288:tUiQnjozy4J/aA/z+DNZFFQ6yunCjo3QkFLcnhpSVfBPp9bJ:yrrstr+JFQ6jFAS
-
HawkEye Reborn
HawkEye Reborn is an enhanced version of the HawkEye malware kit.
-
M00nd3v_Logger
M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
Modifies WinLogon for persistence
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-