General

  • Target

    dff1be24e79ca88d0015556ca63e9531_JaffaCakes118

  • Size

    866KB

  • Sample

    240914-lt2pesxgln

  • MD5

    dff1be24e79ca88d0015556ca63e9531

  • SHA1

    81e7c9edea8a1c30932fc09f7a3b6079877a5961

  • SHA256

    d61866514e2dd4fe6bbd8c5483145b1f4ea54f49f52f5365c4c3c7c33c8ef6aa

  • SHA512

    7eabe1655dcf909cb6b572e3715b690c0fdd3c3034891cb258df414f75f274f0ec4ffb5c7aa2e43f09ef5e1145e1519d96bc707cb853c7b727c4b6535dfc5adb

  • SSDEEP

    12288:Hmmo7YNQzGnBaWnBsPDqWOFqetuiaSwXb0lvIfU+5wOAjgctw3+syodhw3a2:GvwQyBaWnBCqyaaNCM2OAjguDqhwq2

Malware Config

Targets

    • Target

      dff1be24e79ca88d0015556ca63e9531_JaffaCakes118

    • Size

      866KB

    • MD5

      dff1be24e79ca88d0015556ca63e9531

    • SHA1

      81e7c9edea8a1c30932fc09f7a3b6079877a5961

    • SHA256

      d61866514e2dd4fe6bbd8c5483145b1f4ea54f49f52f5365c4c3c7c33c8ef6aa

    • SHA512

      7eabe1655dcf909cb6b572e3715b690c0fdd3c3034891cb258df414f75f274f0ec4ffb5c7aa2e43f09ef5e1145e1519d96bc707cb853c7b727c4b6535dfc5adb

    • SSDEEP

      12288:Hmmo7YNQzGnBaWnBsPDqWOFqetuiaSwXb0lvIfU+5wOAjgctw3+syodhw3a2:GvwQyBaWnBCqyaaNCM2OAjguDqhwq2

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks