General

  • Target

    e2cffd4d941772c0aa91d2aeba2ce7e9_JaffaCakes118

  • Size

    108KB

  • Sample

    241211-xrb7javldz

  • MD5

    e2cffd4d941772c0aa91d2aeba2ce7e9

  • SHA1

    a6400519e5f6e7240022d911d951d6db431338a7

  • SHA256

    78c880cd0af8ce8a916a6143eb7faa8e272feaca225af11c83bc4a3a7ec3cd04

  • SHA512

    189d5653b40faedb0f9ab3f18b2112211dfaf8217fc33aaefb6f23180c9bb9df109875fc2752621c0a73536c5391fcf853e883c242e15a193d75d31f21d8ca1f

  • SSDEEP

    3072:6oy8j7VnNdrPHaSekwi+mW+2IoYO1out:q8jZ7rvaU3+mWrWKoS

Malware Config

Targets

    • Target

      e2cffd4d941772c0aa91d2aeba2ce7e9_JaffaCakes118

    • Size

      108KB

    • MD5

      e2cffd4d941772c0aa91d2aeba2ce7e9

    • SHA1

      a6400519e5f6e7240022d911d951d6db431338a7

    • SHA256

      78c880cd0af8ce8a916a6143eb7faa8e272feaca225af11c83bc4a3a7ec3cd04

    • SHA512

      189d5653b40faedb0f9ab3f18b2112211dfaf8217fc33aaefb6f23180c9bb9df109875fc2752621c0a73536c5391fcf853e883c242e15a193d75d31f21d8ca1f

    • SSDEEP

      3072:6oy8j7VnNdrPHaSekwi+mW+2IoYO1out:q8jZ7rvaU3+mWrWKoS

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks