General

  • Target

    e38e24a61cea61809d0fc032bd64649d_JaffaCakes118

  • Size

    871KB

  • Sample

    240915-266rxaxcmc

  • MD5

    e38e24a61cea61809d0fc032bd64649d

  • SHA1

    f359dc95bdcca6da298b8006d7275c60f1d1d1c8

  • SHA256

    0966279bd20d18d6c979c61bfab360fdebdf6dfce9853eea1cd070414781981f

  • SHA512

    bb9369b32c68c2be82b3810105f39dcff4eac1afe0cde4eef247005efb2d39cbad84af37d1a44d296b47341190f1cc0bd25429e505afd57fdbf0fcb943e3a58e

  • SSDEEP

    24576:xHgAHgAr6yAXbr8RuO0uku+RvLt4SWFo2/Nf:xHgAHgAr1A8uKku+RvLt4SWFo2h

Malware Config

Targets

    • Target

      e38e24a61cea61809d0fc032bd64649d_JaffaCakes118

    • Size

      871KB

    • MD5

      e38e24a61cea61809d0fc032bd64649d

    • SHA1

      f359dc95bdcca6da298b8006d7275c60f1d1d1c8

    • SHA256

      0966279bd20d18d6c979c61bfab360fdebdf6dfce9853eea1cd070414781981f

    • SHA512

      bb9369b32c68c2be82b3810105f39dcff4eac1afe0cde4eef247005efb2d39cbad84af37d1a44d296b47341190f1cc0bd25429e505afd57fdbf0fcb943e3a58e

    • SSDEEP

      24576:xHgAHgAr6yAXbr8RuO0uku+RvLt4SWFo2/Nf:xHgAHgAr1A8uKku+RvLt4SWFo2h

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks