General

  • Target

    8eb99bfa4661173013caa33ef3480042_JaffaCakes118

  • Size

    194KB

  • Sample

    241104-c4rsjazra1

  • MD5

    8eb99bfa4661173013caa33ef3480042

  • SHA1

    10f8c3bc07d0dba10f0b0589c2b489c87bce944e

  • SHA256

    61e6786a5789b9e867a315d45c37c759ddf72356ffde6c928f1ef5e01e4d2c21

  • SHA512

    0d888aef5127bc5c49f08258b29f49d0c677e697a5ae64fa04e31810002e08ca59588c810fb1c43cba9522b24338e325120cec39fcd82cac5479b5b05da5de75

  • SSDEEP

    3072:/oy8j7VnNdrPHaSekwi+mWRvMCIPltbout798eaJcl/p:P8jZ7rvaU3+mWRyP3boSr4O/

Malware Config

Targets

    • Target

      8eb99bfa4661173013caa33ef3480042_JaffaCakes118

    • Size

      194KB

    • MD5

      8eb99bfa4661173013caa33ef3480042

    • SHA1

      10f8c3bc07d0dba10f0b0589c2b489c87bce944e

    • SHA256

      61e6786a5789b9e867a315d45c37c759ddf72356ffde6c928f1ef5e01e4d2c21

    • SHA512

      0d888aef5127bc5c49f08258b29f49d0c677e697a5ae64fa04e31810002e08ca59588c810fb1c43cba9522b24338e325120cec39fcd82cac5479b5b05da5de75

    • SSDEEP

      3072:/oy8j7VnNdrPHaSekwi+mWRvMCIPltbout798eaJcl/p:P8jZ7rvaU3+mWRyP3boSr4O/

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks