General

  • Target

    JaffaCakes118_7955ce3d796ca8a03a55d2edefd32f25

  • Size

    381KB

  • Sample

    250116-rzfa9swjeq

  • MD5

    7955ce3d796ca8a03a55d2edefd32f25

  • SHA1

    5725494c18c0f3f32fcd5a5c01ad8a09e8ee7831

  • SHA256

    aac971e1ff6dcb52dac8ee0749261f8995ebe3c870511e9f3ea291882d6e41b0

  • SHA512

    6e5141863878e855b40c6c95ae6658ef8f6bad01a3f1b127675e6d6d7c3fcf2a2f7d85425388594ff4e80d67e5a7c5d2d78fd630914cba291860c74156b34c08

  • SSDEEP

    6144:P9mIRKIXJMFy/x3gC/j4fGyUFvyuja3Xcbp/jXv7TYJwKumRCBF1CgVAtEPm2/2:715oy/e4j4fGcum3Xct/DYJwKuNLQgVS

Malware Config

Targets

    • Target

      JaffaCakes118_7955ce3d796ca8a03a55d2edefd32f25

    • Size

      381KB

    • MD5

      7955ce3d796ca8a03a55d2edefd32f25

    • SHA1

      5725494c18c0f3f32fcd5a5c01ad8a09e8ee7831

    • SHA256

      aac971e1ff6dcb52dac8ee0749261f8995ebe3c870511e9f3ea291882d6e41b0

    • SHA512

      6e5141863878e855b40c6c95ae6658ef8f6bad01a3f1b127675e6d6d7c3fcf2a2f7d85425388594ff4e80d67e5a7c5d2d78fd630914cba291860c74156b34c08

    • SSDEEP

      6144:P9mIRKIXJMFy/x3gC/j4fGyUFvyuja3Xcbp/jXv7TYJwKumRCBF1CgVAtEPm2/2:715oy/e4j4fGcum3Xct/DYJwKuNLQgVS

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • Windows security bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks