General

  • Target

    e37907163a8a6675b4e66ff75978f128_JaffaCakes118

  • Size

    388KB

  • Sample

    241211-19j7msvnbp

  • MD5

    e37907163a8a6675b4e66ff75978f128

  • SHA1

    575d44ad76239795c093103b7e34e23d5c33b475

  • SHA256

    6cde68262c4e1b9813c1decf82c06efa1c74eed42fb38fcba3dc0cabdbf29ca1

  • SHA512

    792f95ba82dc31aeca75d57d15148c933b05e6d4ebc63af18f4c56603b4061917ef719f2de75d96446487dc40df902f4cdff56627bbdf2d944e6912cf06fb24c

  • SSDEEP

    12288:HHLUMuiv9RgfSjAzRtyTx+qup8RW77sK2W:btARyuHc2

Malware Config

Targets

    • Target

      e37907163a8a6675b4e66ff75978f128_JaffaCakes118

    • Size

      388KB

    • MD5

      e37907163a8a6675b4e66ff75978f128

    • SHA1

      575d44ad76239795c093103b7e34e23d5c33b475

    • SHA256

      6cde68262c4e1b9813c1decf82c06efa1c74eed42fb38fcba3dc0cabdbf29ca1

    • SHA512

      792f95ba82dc31aeca75d57d15148c933b05e6d4ebc63af18f4c56603b4061917ef719f2de75d96446487dc40df902f4cdff56627bbdf2d944e6912cf06fb24c

    • SSDEEP

      12288:HHLUMuiv9RgfSjAzRtyTx+qup8RW77sK2W:btARyuHc2

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks