General

  • Target

    b24d4a4e7fa3c44aca03de5f7fdb5c6e_JaffaCakes118

  • Size

    971KB

  • Sample

    240616-h3fa1aybnn

  • MD5

    b24d4a4e7fa3c44aca03de5f7fdb5c6e

  • SHA1

    9e23dd87834318528574088330dd5936afdf0749

  • SHA256

    6c4a649a0f9b10174c6556de62e77fd1551492f500c498b463466f6da4be20aa

  • SHA512

    bc8ffb6521e0c625ff3a0f8f5ceef603fbc03fc7b9320f0f431cafb9d6c46bc9591152a714910e16ab01dc08320a787fcd2d67bdb1e332da2e19651ce2621c60

  • SSDEEP

    24576:Mpo/2+ttPJLfpRK3CjfvWEv8W8CcQy2U1VZx4n:Fe2PJLa3CjfOEEZKyvE

Malware Config

Targets

    • Target

      b24d4a4e7fa3c44aca03de5f7fdb5c6e_JaffaCakes118

    • Size

      971KB

    • MD5

      b24d4a4e7fa3c44aca03de5f7fdb5c6e

    • SHA1

      9e23dd87834318528574088330dd5936afdf0749

    • SHA256

      6c4a649a0f9b10174c6556de62e77fd1551492f500c498b463466f6da4be20aa

    • SHA512

      bc8ffb6521e0c625ff3a0f8f5ceef603fbc03fc7b9320f0f431cafb9d6c46bc9591152a714910e16ab01dc08320a787fcd2d67bdb1e332da2e19651ce2621c60

    • SSDEEP

      24576:Mpo/2+ttPJLfpRK3CjfvWEv8W8CcQy2U1VZx4n:Fe2PJLa3CjfOEEZKyvE

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks