General

  • Target

    85c36b7743003c451e9fa4ff26accfa8_JaffaCakes118

  • Size

    580KB

  • Sample

    241102-q4644svqcy

  • MD5

    85c36b7743003c451e9fa4ff26accfa8

  • SHA1

    c1c845c1fba3c7590ec202a628067b3b50762e27

  • SHA256

    dc94be95ae15956195b8ab6f9327ed76f73db392d02f1da6ac09eb1635b8e666

  • SHA512

    73b48916759de3b868dcf82d2988adf9ec32406601512174c510524131430c2dd41fdc910c0bbb38ec1a2a5876283049ebe587a8a7aa9e5c5f0db63ad9562c06

  • SSDEEP

    12288:bR5attOIr9Pi0Xi2wJTF7N/rmLTPMWQN+843+bBVBKETb/cZmN8/:cixTGLXQcnObBPf/Kr

Malware Config

Targets

    • Target

      85c36b7743003c451e9fa4ff26accfa8_JaffaCakes118

    • Size

      580KB

    • MD5

      85c36b7743003c451e9fa4ff26accfa8

    • SHA1

      c1c845c1fba3c7590ec202a628067b3b50762e27

    • SHA256

      dc94be95ae15956195b8ab6f9327ed76f73db392d02f1da6ac09eb1635b8e666

    • SHA512

      73b48916759de3b868dcf82d2988adf9ec32406601512174c510524131430c2dd41fdc910c0bbb38ec1a2a5876283049ebe587a8a7aa9e5c5f0db63ad9562c06

    • SSDEEP

      12288:bR5attOIr9Pi0Xi2wJTF7N/rmLTPMWQN+843+bBVBKETb/cZmN8/:cixTGLXQcnObBPf/Kr

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks