General

  • Target

    f3c1e2686a27b1be0e337cf2f43b7468_JaffaCakes118

  • Size

    1.5MB

  • Sample

    241215-nfp5kssmex

  • MD5

    f3c1e2686a27b1be0e337cf2f43b7468

  • SHA1

    4046c4c66512265090cbb7e1410d374df6758417

  • SHA256

    90128feadee82e9fa35d046c57e3031c562f4cbe766bbe1bc585270f94d2fe30

  • SHA512

    461db463eee51d734c2ac974861a16973edb44bf6a24542a17aafb2f5baf5484e4581069890d4fa6a93f1daa04b552e8e488c8dfcfe127e5ea79c3fbafa1110d

  • SSDEEP

    24576:z58wvtcbFLiO/zH3NGCswzncoJ7yRoLSEBs8z:z58WQZJGCswzcmGRo

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    ftp.nascenthotels.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    NGozi@?11122$%@uak

Targets

    • Target

      f3c1e2686a27b1be0e337cf2f43b7468_JaffaCakes118

    • Size

      1.5MB

    • MD5

      f3c1e2686a27b1be0e337cf2f43b7468

    • SHA1

      4046c4c66512265090cbb7e1410d374df6758417

    • SHA256

      90128feadee82e9fa35d046c57e3031c562f4cbe766bbe1bc585270f94d2fe30

    • SHA512

      461db463eee51d734c2ac974861a16973edb44bf6a24542a17aafb2f5baf5484e4581069890d4fa6a93f1daa04b552e8e488c8dfcfe127e5ea79c3fbafa1110d

    • SSDEEP

      24576:z58wvtcbFLiO/zH3NGCswzncoJ7yRoLSEBs8z:z58WQZJGCswzcmGRo

    • HawkEye

      HawkEye is a malware kit that has seen continuous development since at least 2013.

    • Hawkeye family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks