General

  • Target

    5bd63568e12753b7d4c1c3132f60b6ed_JaffaCakes118

  • Size

    987KB

  • Sample

    240519-2h3qcaee4s

  • MD5

    5bd63568e12753b7d4c1c3132f60b6ed

  • SHA1

    c4dd12a2142102d979be73457f500d10ea7572cd

  • SHA256

    8db60922ef95a644bfb0dced7bed12037c2045b842a2525b2b13713659a997b3

  • SHA512

    82c3ab207dea015862f9163079cabfe69fcb27f58730d93372cf7704a3cddc0944b348a624e9b19ff5f9b7756f402aa8095d24df2800f62da04ba4467e6bdd5b

  • SSDEEP

    24576:XQRRRRRRRRRRRRRRRRRRRRRtOperrOUj6k7ZqC30Qa/1T/lQ5m1zYHB3wMAx0ZDt:XQRRRRRRRRRRRRRRRRRRRRRtak7Zx7ae

Malware Config

Targets

    • Target

      5bd63568e12753b7d4c1c3132f60b6ed_JaffaCakes118

    • Size

      987KB

    • MD5

      5bd63568e12753b7d4c1c3132f60b6ed

    • SHA1

      c4dd12a2142102d979be73457f500d10ea7572cd

    • SHA256

      8db60922ef95a644bfb0dced7bed12037c2045b842a2525b2b13713659a997b3

    • SHA512

      82c3ab207dea015862f9163079cabfe69fcb27f58730d93372cf7704a3cddc0944b348a624e9b19ff5f9b7756f402aa8095d24df2800f62da04ba4467e6bdd5b

    • SSDEEP

      24576:XQRRRRRRRRRRRRRRRRRRRRRtOperrOUj6k7ZqC30Qa/1T/lQ5m1zYHB3wMAx0ZDt:XQRRRRRRRRRRRRRRRRRRRRRtak7Zx7ae

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks