General

  • Target

    361efc2114f658f7e242e3bb1734719e_JaffaCakes118

  • Size

    1015KB

  • Sample

    241011-wny2fszhrm

  • MD5

    361efc2114f658f7e242e3bb1734719e

  • SHA1

    30fa8072f243ca927f99d14546161e39aa7cf5ff

  • SHA256

    29348930cf258fae2c57f912099b745ac5a52dfe00942449f0547bfd926f3daa

  • SHA512

    e66c45538ae78ad10fe08a612d8f342e2b75c78b32714d3d3d68b94f5a537c675be562bb48cd1dec086d40f0d7ca81bab2f414b4e9a508cd572d06ea908838a5

  • SSDEEP

    24576:FfvNY30Be8sbZdLlW+1k8iXZwqcK/midRv9j0SFYNaRU1F4:dsFdLlW+1pihf3lTF+

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.mail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    mastercocolate1

Targets

    • Target

      361efc2114f658f7e242e3bb1734719e_JaffaCakes118

    • Size

      1015KB

    • MD5

      361efc2114f658f7e242e3bb1734719e

    • SHA1

      30fa8072f243ca927f99d14546161e39aa7cf5ff

    • SHA256

      29348930cf258fae2c57f912099b745ac5a52dfe00942449f0547bfd926f3daa

    • SHA512

      e66c45538ae78ad10fe08a612d8f342e2b75c78b32714d3d3d68b94f5a537c675be562bb48cd1dec086d40f0d7ca81bab2f414b4e9a508cd572d06ea908838a5

    • SSDEEP

      24576:FfvNY30Be8sbZdLlW+1k8iXZwqcK/midRv9j0SFYNaRU1F4:dsFdLlW+1pihf3lTF+

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks