General

  • Target

    217b447b0791d6cbcf06a227f34570b1_JaffaCakes118

  • Size

    744KB

  • Sample

    240507-ylw57afd68

  • MD5

    217b447b0791d6cbcf06a227f34570b1

  • SHA1

    f1835601eef626ff4b7069c15f7d8c34e64ff8f9

  • SHA256

    4a1a81651fa84dd61c6968ba83d03fab3a8f0dc94e839a376bacc53be86ffe52

  • SHA512

    b48c1b38b362c7ac3c9c3d13dae09cac6f02f28902eb158dd8996a2e001cf30e1afe3a4393fac7692f2635f92706c18094f8ac05d89992aac339df2705cf1b7c

  • SSDEEP

    12288:/MboOwkyVGvuC8GlpkCaiF2lbFp5Ry68SzMuU9BtjorgqA7SQjDrAO1RUJJPNoq0:/goOwkyovL8GlpVar9u6nzMuUbigFZoq

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    alibaba123

Targets

    • Target

      RSL-2019.exe

    • Size

      782KB

    • MD5

      960ac9e115b8ee2adfe3460d7a9f0eed

    • SHA1

      f845c68575e67d0a5112113c31fc8a46a1cb9d01

    • SHA256

      fd4612dd41fcb1d4038385cde915ff6c3b3136ba4edee76bdf1224eb224914ad

    • SHA512

      ad85679b972fc19afcef5177502c83824e0d62b19827ef00ac9285f2e645cb0178160caf7ddd8aecb94564783a4b1ff7758b66677bff6341ce78c69ee6a9eb34

    • SSDEEP

      12288:CTCHhLQk3jEB0/iR+V2b5Y1bz9tPfFpb4m7LjeZx3TJu/Hv0J5tmCB77k:CTwv6R+G5e/95HbB7Lje3TgHv0JmCZQ

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks