MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 32a1d99c12d4bbbf6b20ee43a25cf4dccf34ba30d8d40dc68d9c59d4c7ba25d5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



HawkEye


Vendor detections: 10


Intelligence 10 IOCs YARA 1 File information Comments

SHA256 hash: 32a1d99c12d4bbbf6b20ee43a25cf4dccf34ba30d8d40dc68d9c59d4c7ba25d5
SHA3-384 hash: 97e82843260bf99fb986ae00b2251c47988d3b8283d45bd8d3c5dbde5987d262493f50475b1bb2b78b465c88fc0f740f
SHA1 hash: 1c67ae07cc9f304cb40731f6ed64ec1684198aad
MD5 hash: 0e43f07d161f5d0f3739e5588e1bb3e5
humanhash: berlin-december-queen-bakerloo
File name:document.exe
Download: download sample
Signature HawkEye
File size:678'912 bytes
First seen:2020-10-14 15:10:16 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash e558a384d112fb5b0555df8d387d7b2c (3 x AgentTesla, 2 x HawkEye, 1 x MassLogger)
ssdeep 12288:ZPzCGvAfW4oCXIYtsz2eCJqN+eyiA8nMvasSkm5283EKs3iocER2i:hOGYO4/xCrOq8WAdasSX5brSy
Threatray 30 similar samples on MalwareBazaar
TLSH DAE423338AC58AA0D2301A747F33FCF0A84C78521419F2B96D51E96AECBB9D1DA55D83
Reporter abuse_ch
Tags:exe HawkEye


Avatar
abuse_ch
Malspam distributing unidentified malware:

HELO: serv.misrsteel.com
Sending IP: 138.201.220.106
From: Ahmed H. Hashish <ahmed.hamdyhashish@enppi.com>
Reply-To: crew-vantageships@dr.com
Subject: Re: R.F.Q
Attachment: document.zip (contains "document.exe")

Intelligence


File Origin
# of uploads :
1
# of downloads :
90
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Unauthorized injection to a recently created process
Using the Windows Management Instrumentation requests
Creating a file in the %temp% directory
DNS request
Sending an HTTP GET request
Launching a process
Creating a process with a hidden window
Deleting a recently created file
Reading critical registry keys
Sending a TCP request to an infection source
Stealing user critical data
Unauthorized injection to a system process
Result
Threat name:
HawkEye MailPassView
Detection:
malicious
Classification:
phis.troj.spyw.evad
Score:
100 / 100
Signature
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Contains functionality to detect sleep reduction / modifications
Detected HawkEye Rat
Found malware configuration
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Maps a DLL or memory area into another process
May check the online IP address of the machine
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file access)
Writes to foreign memory regions
Yara detected AntiVM_3
Yara detected HawkEye Keylogger
Yara detected MailPassView
Yara detected WebBrowserPassView password recovery tool
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 298119 Sample: document.exe Startdate: 14/10/2020 Architecture: WINDOWS Score: 100 33 Multi AV Scanner detection for domain / URL 2->33 35 Found malware configuration 2->35 37 Malicious sample detected (through community Yara rule) 2->37 39 11 other signatures 2->39 7 document.exe 2->7         started        process3 signatures4 41 Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines) 7->41 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->43 45 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 7->45 47 4 other signatures 7->47 10 document.exe 15 7 7->10         started        14 document.exe 7->14         started        process5 dnsIp6 21 eagleeyeapparels.com 54.39.139.67, 49734, 587 OVHFR Canada 10->21 23 mail.eagleeyeapparels.com 10->23 25 bot.whatismyipaddress.com 66.171.248.178, 49732, 49733, 80 ALCHEMYNETUS United States 10->25 49 Writes to foreign memory regions 10->49 51 Allocates memory in foreign processes 10->51 53 Sample uses process hollowing technique 10->53 55 Injects a PE file into a foreign processes 10->55 16 vbc.exe 10->16         started        19 vbc.exe 12 10->19         started        signatures7 process8 signatures9 27 Tries to steal Instant Messenger accounts or passwords 16->27 29 Tries to steal Mail credentials (via file access) 16->29 31 Tries to harvest and steal browser information (history, passwords, etc) 19->31
Threat name:
Win32.Trojan.Pynamer
Status:
Malicious
First seen:
2020-10-14 01:06:40 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
m00nd3v_logger
Score:
  10/10
Tags:
upx keylogger trojan stealer spyware family:hawkeye_reborn family:m00nd3v_logger
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of SetThreadContext
Looks up external IP address via web service
Reads user/profile data of web browsers
Uses the VBS compiler for execution
UPX packed file
M00nD3v Logger Payload
HawkEye Reborn
M00nd3v_Logger
Unpacked files
SH256 hash:
32a1d99c12d4bbbf6b20ee43a25cf4dccf34ba30d8d40dc68d9c59d4c7ba25d5
MD5 hash:
0e43f07d161f5d0f3739e5588e1bb3e5
SHA1 hash:
1c67ae07cc9f304cb40731f6ed64ec1684198aad
SH256 hash:
1ed806a07dae3c17ed5ec9faf454240738dcff590a06e68e82cfdd462107c85e
MD5 hash:
4fdfeffb6e1c5773ebfe6990dd9d9ffe
SHA1 hash:
24a04516c7fa4cc857550f038f1b00e439da5aba
SH256 hash:
400b411a9bffd687c5e74f51d43b7dc92cdb8d5ca9f674456b75a5d37587d342
MD5 hash:
54e8ded7b148a13d3363ac7b33f6eb06
SHA1 hash:
63dcbe2db9cc14564eb84d5e953f2f9f5c54acd9
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:suspicious_packer_section
Author:@j0sm1
Description:The packer/protector section names/keywords
Reference:http://www.hexacorn.com/blog/2012/10/14/random-stats-from-1-2m-samples-pe-section-names/

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

HawkEye

Executable exe 32a1d99c12d4bbbf6b20ee43a25cf4dccf34ba30d8d40dc68d9c59d4c7ba25d5

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments