General

  • Target

    240421-qe6r2sce7w_pw_infected.zip

  • Size

    775KB

  • Sample

    240426-3d56cafb3s

  • MD5

    7faed85b3127af215f3841d4f8fea3e8

  • SHA1

    6510496968f0e0ad546eaa19f9748f2fe1f52f62

  • SHA256

    1c742b10c45081fb1d7f64ee7165b66dfa82f05bb5233f5567512043031e2633

  • SHA512

    fd873a2527ea2f94fa548c4ce31ad2f9b46622d6b80097933e388ca55c56f876af852cc8986728cad7fc47aebda1695aa24ccd12eced9f482a74157b91babe8c

  • SSDEEP

    12288:U8m42d4TwuzIoUoFqo6n7+SvhAzgUS8xN2YpyOhRpyfmRfmnrnW0WjelZWp/q:aBJgW+SvpUrx0Yp7Tpsr1+p/q

Malware Config

Targets

    • Target

      ff59b59d6fb138bd3a588d89ea0fa1d7_JaffaCakes118

    • Size

      1.3MB

    • MD5

      ff59b59d6fb138bd3a588d89ea0fa1d7

    • SHA1

      fad22ded5983e8d5a9bffa398c3281670e496f46

    • SHA256

      8e1c67e8ed76591ed779773be365b2b66440d958f1bf3556d4512f71836c3d2f

    • SHA512

      7c3017e263d812bac1ad57bf4ed4371fe7414cbde8af077e507811a9ce538d1fdbbb5d396f355792dae67cdf9c25e3b0128a036816d74a48ad68c62e5109054e

    • SSDEEP

      24576:x6qt46zuDJ+ssHguZbtg2aLJ5eKSKmR9Fmt5J2NY9/:xZqARsV5VmFmzJ2M/

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks