General

  • Target

    d23566a393c34cf331f9ebd17c595d56_JaffaCakes118

  • Size

    303KB

  • Sample

    240907-seygsazarr

  • MD5

    d23566a393c34cf331f9ebd17c595d56

  • SHA1

    0900e0a7b38b2e109291453cb415e5566c02b44c

  • SHA256

    6f10da2e27df06f296652f3264f24975daf5e60f9bee874b0b45f8e19348b6ad

  • SHA512

    44f139acb16bc0ca67e64c01eea367726c84118f193b6525720118f10c527082d406f1242d2265f7f1221805d40a1d44a1e2f1f05da983e214c815b4a19b64b5

  • SSDEEP

    3072:+mZlKlEzDq60vSgHbem3myQ8E09JVFyqTGbN5QvuS6nqx3s5/nTZxPcSCAppuBZ8:+1bTbykdf/QcDV7NoWq+uhn1ai0YV6c

Malware Config

Targets

    • Target

      d23566a393c34cf331f9ebd17c595d56_JaffaCakes118

    • Size

      303KB

    • MD5

      d23566a393c34cf331f9ebd17c595d56

    • SHA1

      0900e0a7b38b2e109291453cb415e5566c02b44c

    • SHA256

      6f10da2e27df06f296652f3264f24975daf5e60f9bee874b0b45f8e19348b6ad

    • SHA512

      44f139acb16bc0ca67e64c01eea367726c84118f193b6525720118f10c527082d406f1242d2265f7f1221805d40a1d44a1e2f1f05da983e214c815b4a19b64b5

    • SSDEEP

      3072:+mZlKlEzDq60vSgHbem3myQ8E09JVFyqTGbN5QvuS6nqx3s5/nTZxPcSCAppuBZ8:+1bTbykdf/QcDV7NoWq+uhn1ai0YV6c

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks