General

  • Target

    98a2d9f40887e253f37b4344ac042b28_JaffaCakes118

  • Size

    651KB

  • Sample

    241125-ct65gatjcx

  • MD5

    98a2d9f40887e253f37b4344ac042b28

  • SHA1

    c04272527b3d7117861b6a9144d779d0fbf0e9fd

  • SHA256

    fb40717db4d5f86ce106833f67ba0c5f6933e0288acbab4c8ceb0e8a5549b272

  • SHA512

    a213e3c0e8890414e01495b674106a54bb0b9ae8afddcddcdc1920aa8b63a619ac6cdeab07d7bf3cbbb7ea3cbb11536aef508a2285f894a21bfdfc567f05f4d0

  • SSDEEP

    12288:kpyZT16rCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx16jOD3SxcDDcNDqWYurL0

Malware Config

Targets

    • Target

      98a2d9f40887e253f37b4344ac042b28_JaffaCakes118

    • Size

      651KB

    • MD5

      98a2d9f40887e253f37b4344ac042b28

    • SHA1

      c04272527b3d7117861b6a9144d779d0fbf0e9fd

    • SHA256

      fb40717db4d5f86ce106833f67ba0c5f6933e0288acbab4c8ceb0e8a5549b272

    • SHA512

      a213e3c0e8890414e01495b674106a54bb0b9ae8afddcddcdc1920aa8b63a619ac6cdeab07d7bf3cbbb7ea3cbb11536aef508a2285f894a21bfdfc567f05f4d0

    • SSDEEP

      12288:kpyZT16rCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx16jOD3SxcDDcNDqWYurL0

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies visiblity of hidden/system files in Explorer

    • Modiloader family

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks