General

  • Target

    7c4620b8f4d5bd8b8e73bb7a0f4307e4_JaffaCakes118

  • Size

    397KB

  • Sample

    240528-j16wlsca8z

  • MD5

    7c4620b8f4d5bd8b8e73bb7a0f4307e4

  • SHA1

    dbd4085892e5d0a4c27d3f539718f88949aa89bd

  • SHA256

    209a5f8bceb242a0ed4a94d90dd6aa97dad76b93e7d6dfa021a46d3fda528e60

  • SHA512

    010b08dcfda55d3a873e854001625a7043f600bc3a45c452f1617ec8ea9e944259fb65875ab19e4ec6ad2ff95b6079fd78b1ad5b364882d359365959b80e2202

  • SSDEEP

    6144:hCd7HxK7FmNeDBGw4hwrW33o2E3m3sQ+O/2MGbBEbr+K4cPOxAfQed3CoD1drsgv:0o2gm3sQVxGlEb2KOKQUfrsgBj3eUeU

Malware Config

Targets

    • Target

      7c4620b8f4d5bd8b8e73bb7a0f4307e4_JaffaCakes118

    • Size

      397KB

    • MD5

      7c4620b8f4d5bd8b8e73bb7a0f4307e4

    • SHA1

      dbd4085892e5d0a4c27d3f539718f88949aa89bd

    • SHA256

      209a5f8bceb242a0ed4a94d90dd6aa97dad76b93e7d6dfa021a46d3fda528e60

    • SHA512

      010b08dcfda55d3a873e854001625a7043f600bc3a45c452f1617ec8ea9e944259fb65875ab19e4ec6ad2ff95b6079fd78b1ad5b364882d359365959b80e2202

    • SSDEEP

      6144:hCd7HxK7FmNeDBGw4hwrW33o2E3m3sQ+O/2MGbBEbr+K4cPOxAfQed3CoD1drsgv:0o2gm3sQVxGlEb2KOKQUfrsgBj3eUeU

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks