General

  • Target

    bbaa9a2b954b43dc76eddb3eb39f52a9_JaffaCakes118

  • Size

    718KB

  • Sample

    240618-ngpkfavhpk

  • MD5

    bbaa9a2b954b43dc76eddb3eb39f52a9

  • SHA1

    fde0d2aeae2b838f46ea9e27e8b22a57bb31ed78

  • SHA256

    329e6260889146a492fa6b82bde020f3db2101702ce4eca13974c09275158585

  • SHA512

    d620a4ce3515ef6740105edf1432aa8ef2866665fab67eefb1f29354dcd86e9d2c19c8580075e241a4a60717883c9f69876706d03982d1f41155fa203e990ee6

  • SSDEEP

    12288:CiH2xH7EwHbH0ZWCzSUBSk/ieFDUf3hrj7TEEb/QCUZtYsQjXMGhSawSoMpwq1Fb:CPxAGbH0ZWg1fqeFoPh7jh4tY8OJwSoO

Malware Config

Targets

    • Target

      PO 10884-01.exe

    • Size

      763KB

    • MD5

      6c69ff3ad392bfc6921775dfaee888c9

    • SHA1

      a316d28e4f9bc679c536a98b8386a8d9b828242e

    • SHA256

      861b31169b4ee1cd46f2cf7da3483f91974c10259592253ed54aa7cf58b50b1b

    • SHA512

      b2b6e8a527d3a483331005975d171c21097d3f0ed337f1e5d19cad35d884c0f824e026cbc0ca6c6ca6cb750b9b5d968abaa3b3238a7beadee2b5db753058b356

    • SSDEEP

      12288:bzYlyMqL0jp2ANybNrL0UTfC7V9J+kHl4VqhzyC5wXZ1YMJXaoy6I8GrMjr1e:HMjEANybNrYUT6p9x43ZuMJXaCI8GrMF

    • M00nd3v_Logger

      M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

    • M00nD3v Logger payload

      Detects M00nD3v Logger payload in memory.

    • NirSoft MailPassView

      Password recovery tool for various email clients

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Uses the VBS compiler for execution

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scripting

1
T1064

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Scripting

1
T1064

Modify Registry

1
T1112

Collection

Email Collection

1
T1114

Tasks