General

  • Target

    fc4f504538b1dace6d7ef784cb55a492_JaffaCakes118

  • Size

    890KB

  • Sample

    240928-pr3qgsyeke

  • MD5

    fc4f504538b1dace6d7ef784cb55a492

  • SHA1

    9996ba6fe7d6fa523a767439c7ca6826c8d442de

  • SHA256

    d4d7ffa75e0dcf6d97c0755a9fb059f6a16ea1ab953d70ea27c2bc15e501c563

  • SHA512

    f9ca8f4148040fd8d88230c1e69268307a6b8cb1d23d07eaf42d04e471a3d40fd206d3ac8737586c16be1c74decf1127f0b795970d7f0744d1bdd5b5f5cc2549

  • SSDEEP

    24576:NDCC7a4syWe2U/UKJlKlxtB0QdasKtfKNofsiQR:cf4sy12U/UKTKbbvK0Now

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    myrecords1248@

Targets

    • Target

      fc4f504538b1dace6d7ef784cb55a492_JaffaCakes118

    • Size

      890KB

    • MD5

      fc4f504538b1dace6d7ef784cb55a492

    • SHA1

      9996ba6fe7d6fa523a767439c7ca6826c8d442de

    • SHA256

      d4d7ffa75e0dcf6d97c0755a9fb059f6a16ea1ab953d70ea27c2bc15e501c563

    • SHA512

      f9ca8f4148040fd8d88230c1e69268307a6b8cb1d23d07eaf42d04e471a3d40fd206d3ac8737586c16be1c74decf1127f0b795970d7f0744d1bdd5b5f5cc2549

    • SSDEEP

      24576:NDCC7a4syWe2U/UKJlKlxtB0QdasKtfKNofsiQR:cf4sy12U/UKTKbbvK0Now

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks