General

  • Target

    e4c97ca7a3704c1f58cadd75ec1c798a_JaffaCakes118

  • Size

    154KB

  • Sample

    241212-fklnys1pas

  • MD5

    e4c97ca7a3704c1f58cadd75ec1c798a

  • SHA1

    12604e560cd95f8984cedb758f59c85d91ebb1b3

  • SHA256

    ce9d6f9ce5a56f8d9979def2df8780e6bc6b015f70146954b815b210f435d9b8

  • SHA512

    4ac0445479c663eb8bf8b476e028c0e985d309a98f8c968d37878673ac9b7a819725010bdfc783fc09a5f986e686b60f9de03d5330349d3749f02e52398f2cbd

  • SSDEEP

    3072:cYZ2EMjKl0ipnFP0XFCALsyaRcRnoLgDk4o26hlPHFXDpP935mwzr2mtPQ:cY2EM+l0SZ4sNgnoCQ2yPhImQ

Malware Config

Targets

    • Target

      e4c97ca7a3704c1f58cadd75ec1c798a_JaffaCakes118

    • Size

      154KB

    • MD5

      e4c97ca7a3704c1f58cadd75ec1c798a

    • SHA1

      12604e560cd95f8984cedb758f59c85d91ebb1b3

    • SHA256

      ce9d6f9ce5a56f8d9979def2df8780e6bc6b015f70146954b815b210f435d9b8

    • SHA512

      4ac0445479c663eb8bf8b476e028c0e985d309a98f8c968d37878673ac9b7a819725010bdfc783fc09a5f986e686b60f9de03d5330349d3749f02e52398f2cbd

    • SSDEEP

      3072:cYZ2EMjKl0ipnFP0XFCALsyaRcRnoLgDk4o26hlPHFXDpP935mwzr2mtPQ:cY2EM+l0SZ4sNgnoCQ2yPhImQ

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks