General

  • Target

    JaffaCakes118_3a4bcc9f6f65393c8ba590aa19aed5f0

  • Size

    597KB

  • Sample

    250114-k3z2hstnav

  • MD5

    3a4bcc9f6f65393c8ba590aa19aed5f0

  • SHA1

    d56af4adbfcc9c217e53f0ec050055221c74bed0

  • SHA256

    1ef44c2ae7e60e5c99e2f9a7c7b42cdaf6d50335e08c3d6c1076e68549a11655

  • SHA512

    bf9d56025e2c353a6e1d277b8a66b9afdac772c5ba517600cce841a8b643f37ab0c89bad3121862bd981b926c867a78637642447beb8744ee061d6560a9f516c

  • SSDEEP

    12288:pjypWN0wFzf/h2zVD3AuugyaCPrVkScumAgGThAHTzE7XrqLqbJJvHT:9ysNd/slAjgGj3h3yz+tJvHT

Malware Config

Targets

    • Target

      JaffaCakes118_3a4bcc9f6f65393c8ba590aa19aed5f0

    • Size

      597KB

    • MD5

      3a4bcc9f6f65393c8ba590aa19aed5f0

    • SHA1

      d56af4adbfcc9c217e53f0ec050055221c74bed0

    • SHA256

      1ef44c2ae7e60e5c99e2f9a7c7b42cdaf6d50335e08c3d6c1076e68549a11655

    • SHA512

      bf9d56025e2c353a6e1d277b8a66b9afdac772c5ba517600cce841a8b643f37ab0c89bad3121862bd981b926c867a78637642447beb8744ee061d6560a9f516c

    • SSDEEP

      12288:pjypWN0wFzf/h2zVD3AuugyaCPrVkScumAgGThAHTzE7XrqLqbJJvHT:9ysNd/slAjgGj3h3yz+tJvHT

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks