General

  • Target

    ad21f1628a62e42ed6573a922c72e912_JaffaCakes118

  • Size

    986KB

  • Sample

    240615-gzpjts1bla

  • MD5

    ad21f1628a62e42ed6573a922c72e912

  • SHA1

    96113611e8a70b441af6422129edf164b0e5705c

  • SHA256

    8394de2db5855735e9cf76e77a3cdcbb596ddb44ddc4a7e86f5388080b9e0b4c

  • SHA512

    73c7f4a1afda419f87541fea9e9f9448164cdf724b5c7e5150bdf1346a3177699028aa9e75b4f187719a247c2ba1713bf7aedf2f2e7a9b9eb0acb1fedd1b3af8

  • SSDEEP

    24576:Bc5JGM2ny0Adyc1Cb8PTJecYjUyzC66e:5fyRdycNrscY3

Malware Config

Targets

    • Target

      ad21f1628a62e42ed6573a922c72e912_JaffaCakes118

    • Size

      986KB

    • MD5

      ad21f1628a62e42ed6573a922c72e912

    • SHA1

      96113611e8a70b441af6422129edf164b0e5705c

    • SHA256

      8394de2db5855735e9cf76e77a3cdcbb596ddb44ddc4a7e86f5388080b9e0b4c

    • SHA512

      73c7f4a1afda419f87541fea9e9f9448164cdf724b5c7e5150bdf1346a3177699028aa9e75b4f187719a247c2ba1713bf7aedf2f2e7a9b9eb0acb1fedd1b3af8

    • SSDEEP

      24576:Bc5JGM2ny0Adyc1Cb8PTJecYjUyzC66e:5fyRdycNrscY3

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks