General

  • Target

    fbc246bd9dbfefe6c03df700ea6f8d9e_JaffaCakes118

  • Size

    362KB

  • Sample

    241218-qzd8ja1kbz

  • MD5

    fbc246bd9dbfefe6c03df700ea6f8d9e

  • SHA1

    b4ccf82e9853161eaa6bd2cf5881cc4cfcba9141

  • SHA256

    baefe2f6247b41427216e4ccbba85d0e61294881d1cd6f22897e88d93df0742f

  • SHA512

    c5f89c1a8be2fa6d5640963611acd3358221709edd6c8240b14cd5337eab16261dab133042acf9b5809492889d917f4abd274719a611134b0e557797f4fc4b27

  • SSDEEP

    6144:K5IN5Ii+5INDD4tM/6yTPJerckAozTSs/9/IOOYpelfMJX4eOrgCAbfMbIWwxLEh:KIq7g6yTPQCuTSI9prIfUX4NqfCI1wLF

Malware Config

Targets

    • Target

      fbc246bd9dbfefe6c03df700ea6f8d9e_JaffaCakes118

    • Size

      362KB

    • MD5

      fbc246bd9dbfefe6c03df700ea6f8d9e

    • SHA1

      b4ccf82e9853161eaa6bd2cf5881cc4cfcba9141

    • SHA256

      baefe2f6247b41427216e4ccbba85d0e61294881d1cd6f22897e88d93df0742f

    • SHA512

      c5f89c1a8be2fa6d5640963611acd3358221709edd6c8240b14cd5337eab16261dab133042acf9b5809492889d917f4abd274719a611134b0e557797f4fc4b27

    • SSDEEP

      6144:K5IN5Ii+5INDD4tM/6yTPJerckAozTSs/9/IOOYpelfMJX4eOrgCAbfMbIWwxLEh:KIq7g6yTPQCuTSI9prIfUX4NqfCI1wLF

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks