MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 68101d145825fc980210f1f56638011d98eeaf5c53fb734b62a80dac6489f2e3. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry


Intelligence File information Yara 4 Comments

SHA256 hash: 68101d145825fc980210f1f56638011d98eeaf5c53fb734b62a80dac6489f2e3
SHA3-384 hash: 04f40ab9ee3de229c361ad35165373c5add1ce79bb983e12b0c426aff8b2caa991abe792d5a36931c48951bd7049704e
SHA1 hash: 7c50b9f3550d1d4c6abdb668cec1d7461a4c13d6
MD5 hash: 1e80be82f8e930a7160c225ea1fb529e
humanhash: item-glucose-beryllium-nebraska
File name:Purchase Order_23011008_PDF ________________________ iGSTEEEE1124EEEEEEXEEEE.EXE
Download: download sample
Signature HawkEye
File size:1'880'576 bytes
First seen:2020-06-18 11:10:20 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 3d95adbf13bbe79dc24dccb401c12091
ssdeep 24576:ltb20pkaCqT5TBWgNQ7aFA85eSzxNSqSPkUq6DmS+FtI/7IcEfjinkNOYPVns6f3:WVg5tQ7aFA85en1xmJTrfjinUsU5
TLSH BE95D0A263CDC264C6B35173B936B7136D7BB91D4DA4B45F2F946E2EBC20322011B963
Reporter @abuse_ch
Tags:exe HawkEye Yahoo


Twitter
@abuse_ch
Malspam distributing HawkEye:

HELO: sonic301-47.consmr.mail.sg3.yahoo.com
Sending IP: 106.10.242.110
From: Jakir Kamate <rahilenterprises7@yahoo.com>
Reply-To: Jakir Kamate <rahilenterprises7@yahoo.com>
Subject: Re: PO
Attachment: Purchase Order_23011008_PDF.zip (contains "Purchase Order_23011008_PDF ________________________ iGSTEEEE1124EEEEEEXEEEE.EXE")

HawkEye SMTP exfil server:
outback.websitewelcome.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
43
Origin country :
FR FR
Mail intelligence
Geo location:
Global
Volume:
Low
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.Predator
Status:
Malicious
First seen:
2020-06-18 11:39:59 UTC
AV detection:
28 of 31 (90.32%)
Threat level
  5/5
Result
Malware family:
hawkeye
Score:
  10/10
Tags:
keylogger trojan stealer spyware family:hawkeye persistence evasion
Behaviour
Suspicious use of FindShellTrayWindow
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetThreadContext
Looks up external IP address via web service
Adds Run entry to start application
Modifies system certificate store
Drops startup file
Uses the VBS compiler for execution
Reads user/profile data of web browsers
HawkEye

Yara Signatures


Rule name:Hawkeye
Author:JPCERT/CC Incident Response Group
Description:detect HawkEye in memory
Reference:internal research
Rule name:RAT_HawkEye
Author:Kevin Breen <kevin@techanarchy.net>
Description:Detects HawkEye RAT
Reference:http://malwareconfig.com/stats/HawkEye
Rule name:win_hawkeye_keylogger_w0
Author: Kevin Breen <kevin@techanarchy.net>
Rule name:with_sqlite
Author:Julian J. Gonzalez <info@seguridadparatodos.es>
Description:Rule to detect the presence of SQLite data in raw image
Reference:http://www.st2labs.com

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

HawkEye

Executable exe 68101d145825fc980210f1f56638011d98eeaf5c53fb734b62a80dac6489f2e3

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments