General

  • Target

    e77e1935f9dd037308a52e4e5ead478d_JaffaCakes118

  • Size

    313KB

  • Sample

    240917-xk49qsygqf

  • MD5

    e77e1935f9dd037308a52e4e5ead478d

  • SHA1

    819fd3eda198b5fa75c756a5c8601706d2dfdde7

  • SHA256

    c0c16b74d5595e972d609ff8bc0bed899423c134ea9d1f9310ceac0e9d5ce423

  • SHA512

    f320e4f8fcd24f87e94714aa71cd3c758877d05489867152ef2e55ef4891ac51d418f6764abaa6773cfc2c39689960ba3df86e8016dc61b62963ffc4b8478905

  • SSDEEP

    6144:0G377xS2Vp2CeiorXhwTBN53XpcCJJvHtoKoS:Pr7xS2Vp6FwTRbJJvHSKoS

Malware Config

Targets

    • Target

      e77e1935f9dd037308a52e4e5ead478d_JaffaCakes118

    • Size

      313KB

    • MD5

      e77e1935f9dd037308a52e4e5ead478d

    • SHA1

      819fd3eda198b5fa75c756a5c8601706d2dfdde7

    • SHA256

      c0c16b74d5595e972d609ff8bc0bed899423c134ea9d1f9310ceac0e9d5ce423

    • SHA512

      f320e4f8fcd24f87e94714aa71cd3c758877d05489867152ef2e55ef4891ac51d418f6764abaa6773cfc2c39689960ba3df86e8016dc61b62963ffc4b8478905

    • SSDEEP

      6144:0G377xS2Vp2CeiorXhwTBN53XpcCJJvHtoKoS:Pr7xS2Vp6FwTRbJJvHSKoS

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks