General

  • Target

    JaffaCakes118_79456dd6b9bb37547052aa11a2383c49

  • Size

    589KB

  • Sample

    250104-mxqxrswmay

  • MD5

    79456dd6b9bb37547052aa11a2383c49

  • SHA1

    cf9682f729b795d68ec1f7fcaa1c97a679f2ce95

  • SHA256

    5460254e81c38df491d627a14e3d8d046171d2e66f9f43f53b6e31350ba48834

  • SHA512

    5c1c44bd582a2a2468b0f39221371162cdb25bb4c26943f573aa1a68ef15332d02eb4186ba7f3c523986fa62008a3a9d0b7a14a518475a1ab00291d0b9983546

  • SSDEEP

    6144:dBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHG3XV+j5eZIPnBFlRe+s2R7hSP1p75:dBMmKGnhDT+JlCTXMjQIDlR/VwYA2GsE

Malware Config

Targets

    • Target

      JaffaCakes118_79456dd6b9bb37547052aa11a2383c49

    • Size

      589KB

    • MD5

      79456dd6b9bb37547052aa11a2383c49

    • SHA1

      cf9682f729b795d68ec1f7fcaa1c97a679f2ce95

    • SHA256

      5460254e81c38df491d627a14e3d8d046171d2e66f9f43f53b6e31350ba48834

    • SHA512

      5c1c44bd582a2a2468b0f39221371162cdb25bb4c26943f573aa1a68ef15332d02eb4186ba7f3c523986fa62008a3a9d0b7a14a518475a1ab00291d0b9983546

    • SSDEEP

      6144:dBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHG3XV+j5eZIPnBFlRe+s2R7hSP1p75:dBMmKGnhDT+JlCTXMjQIDlR/VwYA2GsE

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks