General

  • Target

    8f41ac824a8409697fa45f62c0516bed_JaffaCakes118

  • Size

    173KB

  • Sample

    241104-fkkfwsvdln

  • MD5

    8f41ac824a8409697fa45f62c0516bed

  • SHA1

    65396413a3eb25a578f001deb461ece0f549ad3a

  • SHA256

    e05b7a0930e53360eb140edc38c75260f68cc45015aa6c77b00d3c4558ac74f4

  • SHA512

    e3720b76c86ccaf64ac6153c395e9d097c6faa986c199189fd161b92f21f50ea07c5c68be8d5f9953098eda031246ed011fafa588ccebfa81c544872156611a3

  • SSDEEP

    3072:DE5Xutyk4+BobeZMGb0OrDPr1x6So2Mkg0ZODYZC0RB1ELiO:DE5XIr1x6SWk3ODY75ELiO

Malware Config

Targets

    • Target

      8f41ac824a8409697fa45f62c0516bed_JaffaCakes118

    • Size

      173KB

    • MD5

      8f41ac824a8409697fa45f62c0516bed

    • SHA1

      65396413a3eb25a578f001deb461ece0f549ad3a

    • SHA256

      e05b7a0930e53360eb140edc38c75260f68cc45015aa6c77b00d3c4558ac74f4

    • SHA512

      e3720b76c86ccaf64ac6153c395e9d097c6faa986c199189fd161b92f21f50ea07c5c68be8d5f9953098eda031246ed011fafa588ccebfa81c544872156611a3

    • SSDEEP

      3072:DE5Xutyk4+BobeZMGb0OrDPr1x6So2Mkg0ZODYZC0RB1ELiO:DE5XIr1x6SWk3ODY75ELiO

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks