General

  • Target

    24d7e953e0e46be83259ee83168f7088_JaffaCakes118

  • Size

    836KB

  • Sample

    241008-y1nscssbnl

  • MD5

    24d7e953e0e46be83259ee83168f7088

  • SHA1

    b36eb7432248d008797aa3d45bdc0df6e15b6862

  • SHA256

    5a770772b4d547660b1c784c094f08ce7547d6bcea38b31056397506461371fc

  • SHA512

    246136880d077ed6c7fde2ee491f644954e6640c518cf6324d2fe4a4750db5121a324f763559ac6714410506c1dc2ad31d719cba7369ed8b2d1113a8becc6a55

  • SSDEEP

    24576:u3C7YAHQOM5eF/j60kbA6t5DONNtuxkeeS:u3C7HseF/jyAe0N3uCR

Malware Config

Targets

    • Target

      24d7e953e0e46be83259ee83168f7088_JaffaCakes118

    • Size

      836KB

    • MD5

      24d7e953e0e46be83259ee83168f7088

    • SHA1

      b36eb7432248d008797aa3d45bdc0df6e15b6862

    • SHA256

      5a770772b4d547660b1c784c094f08ce7547d6bcea38b31056397506461371fc

    • SHA512

      246136880d077ed6c7fde2ee491f644954e6640c518cf6324d2fe4a4750db5121a324f763559ac6714410506c1dc2ad31d719cba7369ed8b2d1113a8becc6a55

    • SSDEEP

      24576:u3C7YAHQOM5eF/j60kbA6t5DONNtuxkeeS:u3C7HseF/jyAe0N3uCR

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks