General
-
Target
JaffaCakes118_52b522986029ce23f0b2c2326792cafb
-
Size
441KB
-
Sample
250115-k59zhayjhx
-
MD5
52b522986029ce23f0b2c2326792cafb
-
SHA1
467db5e1435432eb2658c991312db0e65e597ceb
-
SHA256
226938f7d629994198fb18b5613046111040fffae659ccd9bb7da5ee8aa49d5d
-
SHA512
94a9044ad68f1d3c6b3da7a3f3b927b982382a859c053dafb72438be9cc8be19596f9dcf7a287a3d715e04acc94d6ac8cac93fc35a810d1e365c33f078b61e81
-
SSDEEP
12288:1+BcK/lGRgOUqmq9kR6lhKXcWV02ZgeSgl9uDPX:kBcK/cRgOnmq9g6cV02bSqo7
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_52b522986029ce23f0b2c2326792cafb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_52b522986029ce23f0b2c2326792cafb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
latentbot
hackerbatudator.zapto.org
Targets
-
-
Target
JaffaCakes118_52b522986029ce23f0b2c2326792cafb
-
Size
441KB
-
MD5
52b522986029ce23f0b2c2326792cafb
-
SHA1
467db5e1435432eb2658c991312db0e65e597ceb
-
SHA256
226938f7d629994198fb18b5613046111040fffae659ccd9bb7da5ee8aa49d5d
-
SHA512
94a9044ad68f1d3c6b3da7a3f3b927b982382a859c053dafb72438be9cc8be19596f9dcf7a287a3d715e04acc94d6ac8cac93fc35a810d1e365c33f078b61e81
-
SSDEEP
12288:1+BcK/lGRgOUqmq9kR6lhKXcWV02ZgeSgl9uDPX:kBcK/cRgOnmq9g6cV02bSqo7
-
Latentbot family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3