General

  • Target

    JaffaCakes118_6df701a1db146dbc1167d248a9567057

  • Size

    657KB

  • Sample

    250103-t4ddkssrb1

  • MD5

    6df701a1db146dbc1167d248a9567057

  • SHA1

    7a1f3fa58360067734b0291316a0a4254811cd39

  • SHA256

    85dd783d98bb41450a8c9a39018467169733ae14aaf3d4a11ae94fee055531f0

  • SHA512

    a4f841be313791801812378ac3d2b72f8e88643ea2a7eeeee1161c788da6d3ffd8f41512e70a755ba552b82e6e33f6f20b274c7c0e61c7d0c3896ff244b7229a

  • SSDEEP

    12288:NHLUMuiv9RgfSjAzRty9jpJ8T1uxp62KW8CcCzyU56RZv+Pyyar:1tAR2X8Ev8W8CcQy2U1hym

Malware Config

Targets

    • Target

      JaffaCakes118_6df701a1db146dbc1167d248a9567057

    • Size

      657KB

    • MD5

      6df701a1db146dbc1167d248a9567057

    • SHA1

      7a1f3fa58360067734b0291316a0a4254811cd39

    • SHA256

      85dd783d98bb41450a8c9a39018467169733ae14aaf3d4a11ae94fee055531f0

    • SHA512

      a4f841be313791801812378ac3d2b72f8e88643ea2a7eeeee1161c788da6d3ffd8f41512e70a755ba552b82e6e33f6f20b274c7c0e61c7d0c3896ff244b7229a

    • SSDEEP

      12288:NHLUMuiv9RgfSjAzRty9jpJ8T1uxp62KW8CcCzyU56RZv+Pyyar:1tAR2X8Ev8W8CcQy2U1hym

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks