General

  • Target

    d813060d6851b96638b6f59dfe0d729c_JaffaCakes118

  • Size

    125KB

  • Sample

    240910-mfr4hazhqa

  • MD5

    d813060d6851b96638b6f59dfe0d729c

  • SHA1

    be59f0c32326c583788477addeb4f857861bcc42

  • SHA256

    1efddad99e16cb1fe227b4581da130157e7c2dde5bda4cecb2ccdd3cacfd87cc

  • SHA512

    69cba3d2485081551fdb2abd509b84c49a7e1ffb4fa81ec744eb614f5c75b912fdfc668d7154d0508a38166aa82426810bd9681e7e5aeaac432e7cec63ca307e

  • SSDEEP

    3072:z59Nk+Q1FU8fX+k5SEC1B6rAUZB+TpsfoN:zDinFU+X+k5BC1BqFiioN

Malware Config

Targets

    • Target

      d813060d6851b96638b6f59dfe0d729c_JaffaCakes118

    • Size

      125KB

    • MD5

      d813060d6851b96638b6f59dfe0d729c

    • SHA1

      be59f0c32326c583788477addeb4f857861bcc42

    • SHA256

      1efddad99e16cb1fe227b4581da130157e7c2dde5bda4cecb2ccdd3cacfd87cc

    • SHA512

      69cba3d2485081551fdb2abd509b84c49a7e1ffb4fa81ec744eb614f5c75b912fdfc668d7154d0508a38166aa82426810bd9681e7e5aeaac432e7cec63ca307e

    • SSDEEP

      3072:z59Nk+Q1FU8fX+k5SEC1B6rAUZB+TpsfoN:zDinFU+X+k5BC1BqFiioN

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks