General

  • Target

    JaffaCakes118_0497edad198cee5945d03ef3dcd13e49

  • Size

    149KB

  • Sample

    241231-e3dkmaxnds

  • MD5

    0497edad198cee5945d03ef3dcd13e49

  • SHA1

    0f959b05f8e28392ed7c3f53a4cdc9254c714307

  • SHA256

    f4f31ff44c3073adb53801d268a9db8a51b628530af549c4d8b0bf3ab1cd3e67

  • SHA512

    98dffbdfea9c778a20d9e77a7f5fed372b8914742143dc5779ca526b9f3a472b6aafce079ffa5f587f93536d8e85a3793ccdf798d2f741e1a1e5cef28891b510

  • SSDEEP

    3072:CQB0zCOqle2lo1UllnCKgP70dC/gBV6e9n:AzKJ+1UnCKZE/gBV6e9n

Malware Config

Targets

    • Target

      JaffaCakes118_0497edad198cee5945d03ef3dcd13e49

    • Size

      149KB

    • MD5

      0497edad198cee5945d03ef3dcd13e49

    • SHA1

      0f959b05f8e28392ed7c3f53a4cdc9254c714307

    • SHA256

      f4f31ff44c3073adb53801d268a9db8a51b628530af549c4d8b0bf3ab1cd3e67

    • SHA512

      98dffbdfea9c778a20d9e77a7f5fed372b8914742143dc5779ca526b9f3a472b6aafce079ffa5f587f93536d8e85a3793ccdf798d2f741e1a1e5cef28891b510

    • SSDEEP

      3072:CQB0zCOqle2lo1UllnCKgP70dC/gBV6e9n:AzKJ+1UnCKZE/gBV6e9n

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks