General

  • Target

    723e7c1139d82d5a440909f5a3cba306_JaffaCakes118

  • Size

    732KB

  • Sample

    240525-rnj53sfe51

  • MD5

    723e7c1139d82d5a440909f5a3cba306

  • SHA1

    b733583481aa78f05e81435771c62dd24d2ce95f

  • SHA256

    86d5021cc2c237026b8d86c324debdb38c50b8e1988488f2e2bd2686f4f653a0

  • SHA512

    0af161592fd00e8f6a9c7839c01e1b3a7f730068cdce562f3bf632f28add49967dd0305ea621d972b80265bbefe5ec3864406ec5f9ba4442a7914858bf5b3115

  • SSDEEP

    12288:4VJtYUkkoGly3cJuq2kqYNwnJtFB/yDhv4BK9fsp6b8u8wkpuzvX3X/zid6lgpn:4VJOUnoOy3cwq2ZYNwnGDhv4BK9Up6ba

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.zoho.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    BB123456789BB

Targets

    • Target

      723e7c1139d82d5a440909f5a3cba306_JaffaCakes118

    • Size

      732KB

    • MD5

      723e7c1139d82d5a440909f5a3cba306

    • SHA1

      b733583481aa78f05e81435771c62dd24d2ce95f

    • SHA256

      86d5021cc2c237026b8d86c324debdb38c50b8e1988488f2e2bd2686f4f653a0

    • SHA512

      0af161592fd00e8f6a9c7839c01e1b3a7f730068cdce562f3bf632f28add49967dd0305ea621d972b80265bbefe5ec3864406ec5f9ba4442a7914858bf5b3115

    • SSDEEP

      12288:4VJtYUkkoGly3cJuq2kqYNwnJtFB/yDhv4BK9fsp6b8u8wkpuzvX3X/zid6lgpn:4VJOUnoOy3cwq2ZYNwnGDhv4BK9Up6ba

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Defense Evasion

Scripting

1
T1064

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Email Collection

1
T1114

Tasks