General
-
Target
ed23d01d2ee2f0a59c69cec8a1feb905_JaffaCakes118
-
Size
232KB
-
Sample
241213-23y8nasnel
-
MD5
ed23d01d2ee2f0a59c69cec8a1feb905
-
SHA1
b999d63aa33b20cf41cf60dc7ebb600ef81ce8f4
-
SHA256
b26eb01f6ceedd46a8d8d9396cde9fad80ac38fbb0ba2a818e7e39ba53a3c46a
-
SHA512
66012fc8e8de0cf5b3df5640aa81b89433118413e2132f3328e95eea27b588d0c9f3d1925763eef4ae6190e32c9478053efc1c1140cee8a5c9fccd85be2ce097
-
SSDEEP
3072:o9Ave11jChFjwm5QD+YByNHFTxBWYHrLV0PDzHZPfo6xcbXFbaYCSm6iArHhY:qA0N0okNJWYL65PfFcbX5ajES
Static task
static1
Behavioral task
behavioral1
Sample
Illy_Deactovator_crackd_by__ghost_/Illy Deactovator crackd by VAMPAIRE/cracked.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Illy_Deactovator_crackd_by__ghost_/Illy Deactovator crackd by VAMPAIRE/cracked.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Illy_Deactovator_crackd_by__ghost_/Illy Deactovator crackd by VAMPAIRE/cracked.exe
-
Size
268KB
-
MD5
acfb0633530a15ff5a32e078b2def812
-
SHA1
4920d9cd7db08e4b455e91a3930b6c7a862bf2c6
-
SHA256
e31ec0cb989c40190f0bfe96ac42d564cc4f6a5227cf319a2f4f82d313cf1ca3
-
SHA512
612ad0d4da0870f871f9bb94c6f4e4dbca952e246c9d3f30423b0205a41a51c269377369ea2e4a96ee11d8676fd4cc35adbe7a5446342ce3ad904f7e29085b95
-
SSDEEP
6144:cjbeiQjLnXIHdwl+aXNb9bsmyZO+kzK0g:cuTsKp9tIO+YK
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3