General

  • Target

    eac105e5bb9ebb983ff160f900e8c9c8_JaffaCakes118

  • Size

    502KB

  • Sample

    240919-g5zlzsvdkg

  • MD5

    eac105e5bb9ebb983ff160f900e8c9c8

  • SHA1

    22447353bd4513e9bc83eb6519d144b48ef7a804

  • SHA256

    17ef0fc9f1d3ae56620d04b98efe906145ee48dab9ea50bfe4b79323af486132

  • SHA512

    c2883ef1a84cdd03be25c399df7af0659d6f2b06de45015ebd8157212a9eb26250efe3df41e43ec318271e93698e382d8b951a8d94b64657138618e4ce810a93

  • SSDEEP

    6144:SbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9bHP:SQtqB5urTIoYWBQk1E+VF9mOx9D

Malware Config

Targets

    • Target

      eac105e5bb9ebb983ff160f900e8c9c8_JaffaCakes118

    • Size

      502KB

    • MD5

      eac105e5bb9ebb983ff160f900e8c9c8

    • SHA1

      22447353bd4513e9bc83eb6519d144b48ef7a804

    • SHA256

      17ef0fc9f1d3ae56620d04b98efe906145ee48dab9ea50bfe4b79323af486132

    • SHA512

      c2883ef1a84cdd03be25c399df7af0659d6f2b06de45015ebd8157212a9eb26250efe3df41e43ec318271e93698e382d8b951a8d94b64657138618e4ce810a93

    • SSDEEP

      6144:SbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9bHP:SQtqB5urTIoYWBQk1E+VF9mOx9D

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks