General
-
Target
f43933b50fd0bfc96da5a0e2e4a12973_JaffaCakes118
-
Size
771KB
-
Sample
241215-qrhkzsxkhr
-
MD5
f43933b50fd0bfc96da5a0e2e4a12973
-
SHA1
6d3b255a352901a2bd5bc24a015e6a07b50e4d3b
-
SHA256
f5f424d1dd1dbb7ad82b9f202b5a3d526635d5428add023c6a72d720e96000ce
-
SHA512
9c6236e7d407713777621afad96b1ad0ab50d9a1eba3573c3e22de7a20ed271f045122f23562436eb8a618fc6869591f7e515b7d1ce3959b62f4c4bee8aeda12
-
SSDEEP
24576:wEvm150IWxOjgE5XiaMturF8EamIo2f0wm+EfU4n:wEy5t5XCwhzI70wL6U4n
Behavioral task
behavioral1
Sample
f43933b50fd0bfc96da5a0e2e4a12973_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
latentbot
turkojan4hacker.zapto.org
Targets
-
-
Target
f43933b50fd0bfc96da5a0e2e4a12973_JaffaCakes118
-
Size
771KB
-
MD5
f43933b50fd0bfc96da5a0e2e4a12973
-
SHA1
6d3b255a352901a2bd5bc24a015e6a07b50e4d3b
-
SHA256
f5f424d1dd1dbb7ad82b9f202b5a3d526635d5428add023c6a72d720e96000ce
-
SHA512
9c6236e7d407713777621afad96b1ad0ab50d9a1eba3573c3e22de7a20ed271f045122f23562436eb8a618fc6869591f7e515b7d1ce3959b62f4c4bee8aeda12
-
SSDEEP
24576:wEvm150IWxOjgE5XiaMturF8EamIo2f0wm+EfU4n:wEy5t5XCwhzI70wL6U4n
-
Latentbot family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Virtualization/Sandbox Evasion
1