MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 1fc0b64aa5ad4ffdfdd207d5d59dfe238ab1573b793d6da0dca9df7918fdad9e. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



HawkEye


Vendor detections: 6


Intelligence 6 IOCs YARA 3 File information Comments

SHA256 hash: 1fc0b64aa5ad4ffdfdd207d5d59dfe238ab1573b793d6da0dca9df7918fdad9e
SHA3-384 hash: 78add01f1a4bb4dda38b41f11dbae9cca9482ecd953de6d326a78dfc80dd69c0df72fb996c9c5bb1df8884f362a4b470
SHA1 hash: fe5111687b54156865a988e37a332fd78c758b5f
MD5 hash: 0c4e6ebcece5432054684398a8396f56
humanhash: network-item-thirteen-angel
File name:Payment Invoice.exe
Download: download sample
Signature HawkEye
File size:645'632 bytes
First seen:2020-07-06 14:43:07 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 4fd721b7012fb0eac9a8ce671b3fd22a (8 x AgentTesla, 1 x HawkEye, 1 x Loki)
ssdeep 12288:afladl4S4E7SzTMJN/RRYXK3UoZZw/CiZgZXOhTWpB:0Ql77f7YXEZyOXOgpB
Threatray 2'419 similar samples on MalwareBazaar
TLSH 4DD49E62FED048F3E16A163E4C0B577499E5FE012E289A462BF45C4CAF39641392D2F7
Reporter abuse_ch
Tags:exe HawkEye


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: jt.com.pk
Sending IP: 23.83.133.76
From: Account Manager <muzammil@jt.com.pk>
Subject: Payment Invoice For Outstanding Bills
Attachment: Payment Invoice.zip (contains "Payment Invoice.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
88
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a window
Unauthorized injection to a recently created process
DNS request
Sending an HTTP GET request
Using the Windows Management Instrumentation requests
Reading critical registry keys
Threat name:
Win32.Infostealer.Fareit
Status:
Malicious
First seen:
2020-07-06 13:48:34 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
spyware
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetThreadContext
Suspicious use of SetThreadContext
Looks up external IP address via web service
Looks up external IP address via web service
Reads user/profile data of local email clients
Reads user/profile data of web browsers
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads data files stored by FTP clients
Reads user/profile data of web browsers
UPX packed file
UPX packed file
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:CAP_HookExKeylogger
Author:Brian C. Bell -- @biebsmalwareguy
Reference:https://github.com/DFIRnotes/rules/blob/master/CAP_HookExKeylogger.yar
Rule name:MAL_Envrial_Jan18_1
Author:Florian Roth
Description:Detects Encrial credential stealer malware
Reference:https://twitter.com/malwrhunterteam/status/953313514629853184
Rule name:win_404keylogger_g0
Author:Slavo Greminger, SWITCH-CERT, Daniel Plohmann <daniel.plohmann<at>fkie.fraunhofer.de>

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

HawkEye

Executable exe 1fc0b64aa5ad4ffdfdd207d5d59dfe238ab1573b793d6da0dca9df7918fdad9e

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments