General

  • Target

    dfc309a929c3a30b8235fa42efe2dea4_JaffaCakes118

  • Size

    123KB

  • Sample

    240914-jlfe4stdrf

  • MD5

    dfc309a929c3a30b8235fa42efe2dea4

  • SHA1

    adc949a0b4d027156df93207d877d60179e62377

  • SHA256

    4a45988543ba4957acb202531126a086ed8550c45c087fbeb2f957f9d574436f

  • SHA512

    90cdc305a6284533e24c51ac84622fb7cca038c5c9914b09d6b493c528550476083d6720a2d26120fff84ccca962defccca10b8d13804bc22a961e20086003ec

  • SSDEEP

    3072:boy8j7VnNdrPHaSekwi+mW+2UCvj9outSh:b8jZ7rvaU3+mWrUWBoSG

Malware Config

Targets

    • Target

      dfc309a929c3a30b8235fa42efe2dea4_JaffaCakes118

    • Size

      123KB

    • MD5

      dfc309a929c3a30b8235fa42efe2dea4

    • SHA1

      adc949a0b4d027156df93207d877d60179e62377

    • SHA256

      4a45988543ba4957acb202531126a086ed8550c45c087fbeb2f957f9d574436f

    • SHA512

      90cdc305a6284533e24c51ac84622fb7cca038c5c9914b09d6b493c528550476083d6720a2d26120fff84ccca962defccca10b8d13804bc22a961e20086003ec

    • SSDEEP

      3072:boy8j7VnNdrPHaSekwi+mW+2UCvj9outSh:b8jZ7rvaU3+mWrUWBoSG

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks