General

  • Target

    e00ced37ce53c1d435f4d837ef6f9121_JaffaCakes118

  • Size

    1.1MB

  • Sample

    241211-f2mycaymc1

  • MD5

    e00ced37ce53c1d435f4d837ef6f9121

  • SHA1

    a6da2c186c918d54a0ba81bbc771039aaa92c1fe

  • SHA256

    0622247cd546610207b2ab9aebfccada933800e7f102afcffdd74e8b9bf5dd08

  • SHA512

    a071c9a34e432d7dfa29cf0c7f031b4e247d239bda8446d6841c18116fd632459b6f09e15565ee65c5112101bb34344f7b823aea017279045fc9b0645680b1b3

  • SSDEEP

    24576:jryBIilke1Z4njD1cgvu6cIkyecGClpQZlzFCQUf9:GwRRG6VecGmpQLzFCQ

Malware Config

Targets

    • Target

      e00ced37ce53c1d435f4d837ef6f9121_JaffaCakes118

    • Size

      1.1MB

    • MD5

      e00ced37ce53c1d435f4d837ef6f9121

    • SHA1

      a6da2c186c918d54a0ba81bbc771039aaa92c1fe

    • SHA256

      0622247cd546610207b2ab9aebfccada933800e7f102afcffdd74e8b9bf5dd08

    • SHA512

      a071c9a34e432d7dfa29cf0c7f031b4e247d239bda8446d6841c18116fd632459b6f09e15565ee65c5112101bb34344f7b823aea017279045fc9b0645680b1b3

    • SSDEEP

      24576:jryBIilke1Z4njD1cgvu6cIkyecGClpQZlzFCQUf9:GwRRG6VecGmpQLzFCQ

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks