General

  • Target

    91308b4a3e70fa4e87ad9599517995cf_JaffaCakes118

  • Size

    709KB

  • Sample

    241123-24tpkaxphn

  • MD5

    91308b4a3e70fa4e87ad9599517995cf

  • SHA1

    e6f096a30ce22023268342f87346f8258355258c

  • SHA256

    c43741161e93a5e583af86c35cf1c67126f814427cdf4d82390b62eecc143d8d

  • SHA512

    60469d20b4e776e8b8ece63cc009deeaeaa68ef4447db16f1fd25dc006265bf08f0303d7e1b248b6942b2286075b3b43eb49f738ee6da7972e6051b65cd6fd3a

  • SSDEEP

    12288:6P8Qb6CX8Y3WtpG3zWsIWKdUEQhIYjtjtP43bn:6P8OLKG3jIWPEQhfnQ3bn

Malware Config

Targets

    • Target

      91308b4a3e70fa4e87ad9599517995cf_JaffaCakes118

    • Size

      709KB

    • MD5

      91308b4a3e70fa4e87ad9599517995cf

    • SHA1

      e6f096a30ce22023268342f87346f8258355258c

    • SHA256

      c43741161e93a5e583af86c35cf1c67126f814427cdf4d82390b62eecc143d8d

    • SHA512

      60469d20b4e776e8b8ece63cc009deeaeaa68ef4447db16f1fd25dc006265bf08f0303d7e1b248b6942b2286075b3b43eb49f738ee6da7972e6051b65cd6fd3a

    • SSDEEP

      12288:6P8Qb6CX8Y3WtpG3zWsIWKdUEQhIYjtjtP43bn:6P8OLKG3jIWPEQhfnQ3bn

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks