General

  • Target

    c8a9268f10ec2cae5b78afef1795347c_JaffaCakes118

  • Size

    119KB

  • Sample

    241205-vng79stmat

  • MD5

    c8a9268f10ec2cae5b78afef1795347c

  • SHA1

    2844bc549b48e477100cd7ab846fb7acaea96df6

  • SHA256

    d8a8f33d824fdc8f911e62f294e8fef8efdfe22330a77336f2d93b02f0944106

  • SHA512

    cf1c1d996d61fe74892a80aafd38b5f6aafe6382ebe72a6193c86d1ded6d2be0738f4f96da3bf0411a23ceb5f8d93e02dc4b0bb6ed8aa95002d1c016f973de75

  • SSDEEP

    3072:ioy8j7VnNdrPHaSekwi+mWD5CjuYCZAoutI:y8jZ7rvaU3+mWDwumoSI

Malware Config

Targets

    • Target

      c8a9268f10ec2cae5b78afef1795347c_JaffaCakes118

    • Size

      119KB

    • MD5

      c8a9268f10ec2cae5b78afef1795347c

    • SHA1

      2844bc549b48e477100cd7ab846fb7acaea96df6

    • SHA256

      d8a8f33d824fdc8f911e62f294e8fef8efdfe22330a77336f2d93b02f0944106

    • SHA512

      cf1c1d996d61fe74892a80aafd38b5f6aafe6382ebe72a6193c86d1ded6d2be0738f4f96da3bf0411a23ceb5f8d93e02dc4b0bb6ed8aa95002d1c016f973de75

    • SSDEEP

      3072:ioy8j7VnNdrPHaSekwi+mWD5CjuYCZAoutI:y8jZ7rvaU3+mWDwumoSI

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks