General

  • Target

    a8d0ccca3a104452953a1f6ff2cb4f9d_JaffaCakes118

  • Size

    842KB

  • Sample

    240614-kr4wbstbjb

  • MD5

    a8d0ccca3a104452953a1f6ff2cb4f9d

  • SHA1

    2c4aacf7671bd108568bcc5e5214b94ef4d27543

  • SHA256

    d3cbbe62c635be55722dbe7f9039bdae39b3b9bbbc476d9a31aff01feae8314c

  • SHA512

    d3b056a7ed95d6cf3c5dd52d81ec90b946f58f169e430ac2f6f3733f4653f09905589f6c46c04a85e11570549d94b46ff998df91235308e543a9ed33e751612d

  • SSDEEP

    12288:cbmzUDpvbClksiuPMnmDsg/b/wkkA28BI5qsHt4N9fiZe+dg2CH1WwbKhsDvnxlx:0mktUFPbnkA28iY8t4Dn+ra

Malware Config

Targets

    • Target

      a8d0ccca3a104452953a1f6ff2cb4f9d_JaffaCakes118

    • Size

      842KB

    • MD5

      a8d0ccca3a104452953a1f6ff2cb4f9d

    • SHA1

      2c4aacf7671bd108568bcc5e5214b94ef4d27543

    • SHA256

      d3cbbe62c635be55722dbe7f9039bdae39b3b9bbbc476d9a31aff01feae8314c

    • SHA512

      d3b056a7ed95d6cf3c5dd52d81ec90b946f58f169e430ac2f6f3733f4653f09905589f6c46c04a85e11570549d94b46ff998df91235308e543a9ed33e751612d

    • SSDEEP

      12288:cbmzUDpvbClksiuPMnmDsg/b/wkkA28BI5qsHt4N9fiZe+dg2CH1WwbKhsDvnxlx:0mktUFPbnkA28iY8t4Dn+ra

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks