General

  • Target

    a3e1de50fab68b1be93c4d978b5bb268_JaffaCakes118

  • Size

    455KB

  • Sample

    241126-yxr1lstpen

  • MD5

    a3e1de50fab68b1be93c4d978b5bb268

  • SHA1

    3e13aa04eff4d670a930340e08ecc881947d024a

  • SHA256

    44e193bdd5ecf97f48255811425249c82cb528d181345f95e70a053d494a0ac3

  • SHA512

    fd13a6ac1e101129fff6d1c4a2c1d7e80bcca52d35c3f74fbc39cec696c153f49aa4084832ea6e6a81f339e590ee55becd7a339632605592487ebc84148e5d35

  • SSDEEP

    12288:oRPyIlTofKqGiSLaSMfCz4Kmyyg54TH9q4xSydLhjU0:oYuToLSMvu54TnfdLlU0

Malware Config

Targets

    • Target

      a3e1de50fab68b1be93c4d978b5bb268_JaffaCakes118

    • Size

      455KB

    • MD5

      a3e1de50fab68b1be93c4d978b5bb268

    • SHA1

      3e13aa04eff4d670a930340e08ecc881947d024a

    • SHA256

      44e193bdd5ecf97f48255811425249c82cb528d181345f95e70a053d494a0ac3

    • SHA512

      fd13a6ac1e101129fff6d1c4a2c1d7e80bcca52d35c3f74fbc39cec696c153f49aa4084832ea6e6a81f339e590ee55becd7a339632605592487ebc84148e5d35

    • SSDEEP

      12288:oRPyIlTofKqGiSLaSMfCz4Kmyyg54TH9q4xSydLhjU0:oYuToLSMvu54TnfdLlU0

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks