General

  • Target

    59555cc9fa7a3aa3ba529c4a65eac2ba_JaffaCakes118

  • Size

    253KB

  • Sample

    240729-xgxqgsyemb

  • MD5

    59555cc9fa7a3aa3ba529c4a65eac2ba

  • SHA1

    ec8948a65e62c5f275e4103c702d81a5faabb5a4

  • SHA256

    02c174175f73a1d8ec38874af3aa31ec2aadb693a3cafae8eb0d392a49b8a2ea

  • SHA512

    abd3c2e7e64e077b36c65ba3beec795a16f0184bc39b37b63cf22557e86647bda6861e3448092e96e6b3fef1d0e054a89d50cdd444d337c3d61794058aaed523

  • SSDEEP

    6144:hgu4E6r6FTVkD+rsnStVK0FxdbSqPU/XuBJBOJtABwtSjyVR:eVVr6FKD+eSS0FxtPU/XuNGATyVR

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.sapgroup.com.pk
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    moin@26919

Targets

    • Target

      PO INV No.08242082.exe

    • Size

      523KB

    • MD5

      341653a788a32699346455f3c77d4e03

    • SHA1

      8598641f32b140529871330c4da76214b8ecb1a6

    • SHA256

      eacb842bfb2638dad0dfc194ecf323a019780a3ab3be7f2f21e2a0d5726156f2

    • SHA512

      d1e5348afe3f3166384addc34910057a1bf4c11069a9d8224ae3808626674e7ab0d8a5a30ebc388a495620529e33da878bf5fdfe9917f966bd343f29d52f8e09

    • SSDEEP

      12288:1kjUKvv3jOGU6mLXDvJiw7s2jAXuKuc3JphJT:OwKvrOl6m/0mfA+9kd

    • 404 Keylogger

      Information stealer and keylogger first seen in 2019.

    • 404 Keylogger Main Executable

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks