General

  • Target

    676dda52e0fec9f49caee414127de4ef_JaffaCakes118

  • Size

    806KB

  • Sample

    240723-nrczdstdre

  • MD5

    676dda52e0fec9f49caee414127de4ef

  • SHA1

    6d95db4649588997b3b53b5e95aecb67047ba3ae

  • SHA256

    20f5a9a0987d95a8b22df5c60e246d85259ec8893d0d6f3c7fdfeecb066e6b07

  • SHA512

    ac1dc1bc932c503360119c713b3ae0d81331f1f36838e2b26dab1c8a80e5c4f7df57df19ad6c59cbc8f2f77d02f77fd9f9919cd5be8310ef17ce15d25126ccfb

  • SSDEEP

    12288:fFda+FdaiFQMGqfwkD4KyN5U97OlIhvGPC10KnLkwvsdir8EwBxAOpWerOR8AtsF:VFpGqfwBtN0j10KLkwQiYHsv6At

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.privateemail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MARYolanmauluogwo@ever

Targets

    • Target

      676dda52e0fec9f49caee414127de4ef_JaffaCakes118

    • Size

      806KB

    • MD5

      676dda52e0fec9f49caee414127de4ef

    • SHA1

      6d95db4649588997b3b53b5e95aecb67047ba3ae

    • SHA256

      20f5a9a0987d95a8b22df5c60e246d85259ec8893d0d6f3c7fdfeecb066e6b07

    • SHA512

      ac1dc1bc932c503360119c713b3ae0d81331f1f36838e2b26dab1c8a80e5c4f7df57df19ad6c59cbc8f2f77d02f77fd9f9919cd5be8310ef17ce15d25126ccfb

    • SSDEEP

      12288:fFda+FdaiFQMGqfwkD4KyN5U97OlIhvGPC10KnLkwvsdir8EwBxAOpWerOR8AtsF:VFpGqfwBtN0j10KLkwQiYHsv6At

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Beds Protector Packer

      Detects Beds Protector packer used to load .NET malware.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Drops startup file

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks