General

  • Target

    d9237fdd70369fb5fdda1e5d6b10a1a3_JaffaCakes118

  • Size

    651KB

  • Sample

    241209-mec8ysyqhp

  • MD5

    d9237fdd70369fb5fdda1e5d6b10a1a3

  • SHA1

    0e002afc65053dc957a5a5269841236375205079

  • SHA256

    a4a79cc0e0207c5622d7d2b0157e0d302c3a4f49100994e4d0fb4e8c55bf3f8d

  • SHA512

    800d9518d3974b3cebf773177979fcff2ee11f9ab45120b4d0d346989ed5491079a9dac1fc316813d50c646bd8e194f46f5befd32f356d8e76476108b5fbe3b2

  • SSDEEP

    12288:kpyZT1/rCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx1/jOD3SxcDDcNDqWYurL0

Malware Config

Targets

    • Target

      d9237fdd70369fb5fdda1e5d6b10a1a3_JaffaCakes118

    • Size

      651KB

    • MD5

      d9237fdd70369fb5fdda1e5d6b10a1a3

    • SHA1

      0e002afc65053dc957a5a5269841236375205079

    • SHA256

      a4a79cc0e0207c5622d7d2b0157e0d302c3a4f49100994e4d0fb4e8c55bf3f8d

    • SHA512

      800d9518d3974b3cebf773177979fcff2ee11f9ab45120b4d0d346989ed5491079a9dac1fc316813d50c646bd8e194f46f5befd32f356d8e76476108b5fbe3b2

    • SSDEEP

      12288:kpyZT1/rCxu/mDwLRI6BxcDqp9aqCcajVuD3Z7BPQGMWYur0s0D:kUx1/jOD3SxcDDcNDqWYurL0

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies visiblity of hidden/system files in Explorer

    • Modiloader family

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks