General

  • Target

    ee44bfee7f9731b490a0d4ddad2a3023_JaffaCakes118

  • Size

    295KB

  • Sample

    241214-l9lyxaymbz

  • MD5

    ee44bfee7f9731b490a0d4ddad2a3023

  • SHA1

    e4067b14ba4ff104d720480015aa3b6cdafb93a8

  • SHA256

    e3914df012317c975ea93e9a5a909d45edf8c8f255128c5273e0a9e657801887

  • SHA512

    69877db15695dd96487fafd42830a47106365bf5b38b4d89c5e1df3edb25e9982bd933868ca13bc37d874df00a6ece2b86bf77b095d9179a65b25e68ad2beb4f

  • SSDEEP

    6144:911G377xS2Vp2CeiorXdwTBgWx4v53kpcCJJvHvu2:LYr7xS2Vp6RwTyCFbJJvH5

Malware Config

Targets

    • Target

      ee44bfee7f9731b490a0d4ddad2a3023_JaffaCakes118

    • Size

      295KB

    • MD5

      ee44bfee7f9731b490a0d4ddad2a3023

    • SHA1

      e4067b14ba4ff104d720480015aa3b6cdafb93a8

    • SHA256

      e3914df012317c975ea93e9a5a909d45edf8c8f255128c5273e0a9e657801887

    • SHA512

      69877db15695dd96487fafd42830a47106365bf5b38b4d89c5e1df3edb25e9982bd933868ca13bc37d874df00a6ece2b86bf77b095d9179a65b25e68ad2beb4f

    • SSDEEP

      6144:911G377xS2Vp2CeiorXdwTBgWx4v53kpcCJJvHvu2:LYr7xS2Vp6RwTyCFbJJvH5

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks