General

  • Target

    c1f64bf96488b1ce402952faf2ed5863_JaffaCakes118

  • Size

    774KB

  • Sample

    240826-bbxbwaxdkj

  • MD5

    c1f64bf96488b1ce402952faf2ed5863

  • SHA1

    62737620461ba1f7b37bfd47c7bbbd5a0a52a78f

  • SHA256

    f772318b94adb2aa67ef20c3cafe2ea2d4730321b6a03b1479f555faeec66f1b

  • SHA512

    50d567cd58238cb628dfc82ccef47b8235e66a825e63f7dc4bac89b9e97b969942bc836b6e7b10134e038e32b1ae37d706ccf10d80c49833e4c12d4dffad14d2

  • SSDEEP

    12288:3TaVzKj25fWvNOiqZLY+/GpNHAtX8x3wprVMnzqjkEyvcE64+twtJ871sIjC:3Tqzt5fSOiqZLxGjtqyWjLyvcnzPW

Malware Config

Extracted

Family

hawkeye_reborn

Attributes
  • fields

  • name

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.zoho.com
  • Port:
    587
  • Username:
    submitted147@zoho.com
  • Password:
    internationallove147

Targets

    • Target

      c1f64bf96488b1ce402952faf2ed5863_JaffaCakes118

    • Size

      774KB

    • MD5

      c1f64bf96488b1ce402952faf2ed5863

    • SHA1

      62737620461ba1f7b37bfd47c7bbbd5a0a52a78f

    • SHA256

      f772318b94adb2aa67ef20c3cafe2ea2d4730321b6a03b1479f555faeec66f1b

    • SHA512

      50d567cd58238cb628dfc82ccef47b8235e66a825e63f7dc4bac89b9e97b969942bc836b6e7b10134e038e32b1ae37d706ccf10d80c49833e4c12d4dffad14d2

    • SSDEEP

      12288:3TaVzKj25fWvNOiqZLY+/GpNHAtX8x3wprVMnzqjkEyvcE64+twtJ871sIjC:3Tqzt5fSOiqZLxGjtqyWjLyvcnzPW

    • HawkEye Reborn

      HawkEye Reborn is an enhanced version of the HawkEye malware kit.

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.