General

  • Target

    82c59fc1fde7d89e4a6ef2cd4b6fa924_JaffaCakes118

  • Size

    781KB

  • Sample

    241031-m622dsykdm

  • MD5

    82c59fc1fde7d89e4a6ef2cd4b6fa924

  • SHA1

    7a836aff1631fadd5ff16dd360463b4cebd1a5d4

  • SHA256

    e0bb8d96067183c5cb3663ffa25c1d6a38ada75b3184cedcc96ead8df9c923b2

  • SHA512

    0e30a018e65442fb872128716dafbc7d84127bd69aa99d20d960829463ae103a23433f0827630fbb65343fdc4c65064d41ce29a8b226607543315e81840ce5f5

  • SSDEEP

    12288:g/sRpeFov6a3DEh14L6LGuS3MdInW+K580qxX7CYw921Hd6DEXI0p/MXBnfeAGqm:g/+eWz33LMvdInk8LF+YGEoF3eqm

Malware Config

Targets

    • Target

      82c59fc1fde7d89e4a6ef2cd4b6fa924_JaffaCakes118

    • Size

      781KB

    • MD5

      82c59fc1fde7d89e4a6ef2cd4b6fa924

    • SHA1

      7a836aff1631fadd5ff16dd360463b4cebd1a5d4

    • SHA256

      e0bb8d96067183c5cb3663ffa25c1d6a38ada75b3184cedcc96ead8df9c923b2

    • SHA512

      0e30a018e65442fb872128716dafbc7d84127bd69aa99d20d960829463ae103a23433f0827630fbb65343fdc4c65064d41ce29a8b226607543315e81840ce5f5

    • SSDEEP

      12288:g/sRpeFov6a3DEh14L6LGuS3MdInW+K580qxX7CYw921Hd6DEXI0p/MXBnfeAGqm:g/+eWz33LMvdInk8LF+YGEoF3eqm

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Network Share Discovery

      Attempt to gather information on host network.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks