General

  • Target

    86db08cb0910d12494dae3550c53d7f0_JaffaCakes118

  • Size

    812KB

  • Sample

    241102-wpqrgatrfk

  • MD5

    86db08cb0910d12494dae3550c53d7f0

  • SHA1

    a503cd4ce51b3b25c4f7a482983a7d33d57a91bc

  • SHA256

    e85a49a291742a8499f3a6da4457cc8741edd0a5974e90d64c22d541b7618c6f

  • SHA512

    6d327e55f021628c703694151ff707b75b0ad74ded473771f0e176bd7b28e4032b1927f9ea7543c064accb2e63ff06bdfd867154ce33b4fa68d8488160a8372f

  • SSDEEP

    24576:ZRwQg6icoECnjxoMHVnn496HNBLdzIggCWtK:ZRlHoEn6VnSyFdzFWc

Malware Config

Targets

    • Target

      86db08cb0910d12494dae3550c53d7f0_JaffaCakes118

    • Size

      812KB

    • MD5

      86db08cb0910d12494dae3550c53d7f0

    • SHA1

      a503cd4ce51b3b25c4f7a482983a7d33d57a91bc

    • SHA256

      e85a49a291742a8499f3a6da4457cc8741edd0a5974e90d64c22d541b7618c6f

    • SHA512

      6d327e55f021628c703694151ff707b75b0ad74ded473771f0e176bd7b28e4032b1927f9ea7543c064accb2e63ff06bdfd867154ce33b4fa68d8488160a8372f

    • SSDEEP

      24576:ZRwQg6icoECnjxoMHVnn496HNBLdzIggCWtK:ZRlHoEn6VnSyFdzFWc

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks