General

  • Target

    e4110081bf11752760525a88cef01690_JaffaCakes118

  • Size

    1.0MB

  • Sample

    240916-fnq3vazepp

  • MD5

    e4110081bf11752760525a88cef01690

  • SHA1

    ec723835051ba18424fceeefd640ce436b417f43

  • SHA256

    47d939c48079872afc12ba969ce65ce8e0bf900e2c596ee7a6e2e5433ab2788f

  • SHA512

    b04dcf7dd8e8bd6dbce9fe31629a2c3704ea6addeda54b6342dca8c6674fdae18b3c7849cc7f4f5bceb5b64ccf12ab7f91455694d3d5bacb3c0953e1fe61eb6a

  • SSDEEP

    12288:3WHuC1d0K+cGaFjkLkzPQGEqYxS8Mz8C6VyPPFB/ONVHW7iwKaVE5PChwVlyN14u:GNAGGaFjc1lMz8C6VmPyuPhug45LEBa

Malware Config

Targets

    • Target

      e4110081bf11752760525a88cef01690_JaffaCakes118

    • Size

      1.0MB

    • MD5

      e4110081bf11752760525a88cef01690

    • SHA1

      ec723835051ba18424fceeefd640ce436b417f43

    • SHA256

      47d939c48079872afc12ba969ce65ce8e0bf900e2c596ee7a6e2e5433ab2788f

    • SHA512

      b04dcf7dd8e8bd6dbce9fe31629a2c3704ea6addeda54b6342dca8c6674fdae18b3c7849cc7f4f5bceb5b64ccf12ab7f91455694d3d5bacb3c0953e1fe61eb6a

    • SSDEEP

      12288:3WHuC1d0K+cGaFjkLkzPQGEqYxS8Mz8C6VyPPFB/ONVHW7iwKaVE5PChwVlyN14u:GNAGGaFjc1lMz8C6VmPyuPhug45LEBa

    • Brute Ratel C4

      A customized command and control framework for red teaming and adversary simulation.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks