yara/rules/Windows_Trojan_Hawkeye.yar (47 lines of code) (raw):
rule Windows_Trojan_Hawkeye_77c36ace {
meta:
author = "Elastic Security"
id = "77c36ace-3857-43f8-a6de-596ba7964b6f"
fingerprint = "c9a1c61b4fa78c46d493e1b307e9950bd714ba4e5a6249f15a3b86a74b7638e5"
creation_date = "2021-08-16"
last_modified = "2021-10-04"
threat_name = "Windows.Trojan.Hawkeye"
reference_sample = "28e28025060f1bafd4eb96c7477cab73497ca2144b52e664b254c616607d94cd"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$a1 = "Logger - Key Recorder - [" wide fullword
$a2 = "http://whatismyipaddress.com/" wide fullword
$a3 = "Keylogger Enabled: " wide fullword
$a4 = "LoadPasswordsSeaMonkey" wide fullword
$a5 = "\\.minecraft\\lastlogin" wide fullword
condition:
all of them
}
rule Windows_Trojan_Hawkeye_975d546c {
meta:
author = "Elastic Security"
id = "975d546c-286b-4753-b894-d6ed0aa832f3"
fingerprint = "5bbdb07fa6dd3e415f49d7f4fbc249c078ae42ebd81cad3015e32dfdc8f7cda6"
creation_date = "2023-03-23"
last_modified = "2023-04-23"
threat_name = "Windows.Trojan.Hawkeye"
reference_sample = "aca133bf1d72cf379101e6877871979d6e6e8bc4cc692a5ba815289735014340"
severity = 100
arch_context = "x86"
scan_context = "file, memory"
license = "Elastic License v2"
os = "windows"
strings:
$s1 = "api.telegram.org"
$s2 = "Browsers/Passwords"
$s3 = "Installed Browsers.txt"
$s4 = "Browsers/AutoFills"
$s5 = "Passwords.txt"
$s6 = "System Information.txt"
condition:
all of them
}