General

  • Target

    fc857f195405b95292cba87d4d409fc3_JaffaCakes118

  • Size

    660KB

  • Sample

    240420-l73hwaef81

  • MD5

    fc857f195405b95292cba87d4d409fc3

  • SHA1

    fdfe0f27a558d2f92c3f83e58417bcde1f7e2d5b

  • SHA256

    25af346b7e1978d9946b65a5fe77308791bdf91a1c83582a6b748775f6f51034

  • SHA512

    62b9f6eca7b82e2194f16d5060515297c80c925cf83da94e3f51df504d0a693b00213fe419cf14187214470f7178007430722bf20fa2d021cfa9e4e4e2a74b00

  • SSDEEP

    12288:lTqLtDbIOKkatQoKXpa00bDqlQbnRiTJwYf1cN2nN2JyO6:lwpNawXI00bDqlkA1gyP

Malware Config

Targets

    • Target

      fc857f195405b95292cba87d4d409fc3_JaffaCakes118

    • Size

      660KB

    • MD5

      fc857f195405b95292cba87d4d409fc3

    • SHA1

      fdfe0f27a558d2f92c3f83e58417bcde1f7e2d5b

    • SHA256

      25af346b7e1978d9946b65a5fe77308791bdf91a1c83582a6b748775f6f51034

    • SHA512

      62b9f6eca7b82e2194f16d5060515297c80c925cf83da94e3f51df504d0a693b00213fe419cf14187214470f7178007430722bf20fa2d021cfa9e4e4e2a74b00

    • SSDEEP

      12288:lTqLtDbIOKkatQoKXpa00bDqlQbnRiTJwYf1cN2nN2JyO6:lwpNawXI00bDqlkA1gyP

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies security service

    • Modifies visiblity of hidden/system files in Explorer

    • ModiLoader Second Stage

    • Disables taskbar notifications via registry modification

    • Modifies Installed Components in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks