General

  • Target

    d8b1ee0781eb63734b00db3d31ee184a_JaffaCakes118

  • Size

    469KB

  • Sample

    241209-j7hscswqaq

  • MD5

    d8b1ee0781eb63734b00db3d31ee184a

  • SHA1

    4fdc338738002328d2574f2806a55f6b3696c76e

  • SHA256

    199f5e5e91ce526d366a4c6b63988a8051f2dcb5a17b5360fa3a31122734576c

  • SHA512

    064056f2ebd643f0db5f4a6e0a3e326c5eed3f63bb38504a4a1f60bb27c1ff2691bbac432d38b88fcb1140a7284f7746428a2bc111ba1db57ebff5559be38724

  • SSDEEP

    12288:jzzwe3oselbhHCciT/YIESXsLWdcfoYu8Afy8O:Twe3osefHCciT/YBScL/foiKO

Malware Config

Targets

    • Target

      d8b1ee0781eb63734b00db3d31ee184a_JaffaCakes118

    • Size

      469KB

    • MD5

      d8b1ee0781eb63734b00db3d31ee184a

    • SHA1

      4fdc338738002328d2574f2806a55f6b3696c76e

    • SHA256

      199f5e5e91ce526d366a4c6b63988a8051f2dcb5a17b5360fa3a31122734576c

    • SHA512

      064056f2ebd643f0db5f4a6e0a3e326c5eed3f63bb38504a4a1f60bb27c1ff2691bbac432d38b88fcb1140a7284f7746428a2bc111ba1db57ebff5559be38724

    • SSDEEP

      12288:jzzwe3oselbhHCciT/YIESXsLWdcfoYu8Afy8O:Twe3osefHCciT/YBScL/foiKO

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks