General

  • Target

    f6be6cc8364e832245bf93672602c07a_JaffaCakes118

  • Size

    133KB

  • Sample

    240925-ykdbpaxeqg

  • MD5

    f6be6cc8364e832245bf93672602c07a

  • SHA1

    55b3be42fe7c16f7bc8171f1ec50bad27cfafa2b

  • SHA256

    d2bdfcbd19e9c70db357186951768147fbcab5d35b5d50227970f82be580bafa

  • SHA512

    7b36f6023d513b05c4b7502afe70ab79cf148be5129e74cf286f1cd79d9f5108cc4bf6a3576ee36d398169ad857b0b030c276be8d7bc6aa8eba67575d9dd3819

  • SSDEEP

    3072:wz21bWvnGE5pbQ+47MBmfQF0h6wadsIRTmLYnju:LunzVzBmfAwadsmTmL1

Malware Config

Targets

    • Target

      f6be6cc8364e832245bf93672602c07a_JaffaCakes118

    • Size

      133KB

    • MD5

      f6be6cc8364e832245bf93672602c07a

    • SHA1

      55b3be42fe7c16f7bc8171f1ec50bad27cfafa2b

    • SHA256

      d2bdfcbd19e9c70db357186951768147fbcab5d35b5d50227970f82be580bafa

    • SHA512

      7b36f6023d513b05c4b7502afe70ab79cf148be5129e74cf286f1cd79d9f5108cc4bf6a3576ee36d398169ad857b0b030c276be8d7bc6aa8eba67575d9dd3819

    • SSDEEP

      3072:wz21bWvnGE5pbQ+47MBmfQF0h6wadsIRTmLYnju:LunzVzBmfAwadsmTmL1

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks