General

  • Target

    JaffaCakes118_bf2e80a2a287789655a480e419fff463

  • Size

    497KB

  • Sample

    250119-gkv33axnfy

  • MD5

    bf2e80a2a287789655a480e419fff463

  • SHA1

    d1db884cfe08b47f7cd5f3267450dfed7d5565aa

  • SHA256

    1cc6971898c49b8b35710542083185d7e5fa95514e177217aa09feb9da2c75b0

  • SHA512

    ceea66690e3ded2a844d8c27b3cac8fe6766e857062c9cd4bfe8a1d572644e17069d11d15183882c3f1c14ac8e24230dff88792ca621aa3c19cc0119598bcce7

  • SSDEEP

    12288:jMqP8Tw6b7MP+Dd27VOVUAmoVJws3HVjwYQhlHbriMvXhI:jMY8TR7MP+h27lo7wKFfQ76+hI

Malware Config

Targets

    • Target

      JaffaCakes118_bf2e80a2a287789655a480e419fff463

    • Size

      497KB

    • MD5

      bf2e80a2a287789655a480e419fff463

    • SHA1

      d1db884cfe08b47f7cd5f3267450dfed7d5565aa

    • SHA256

      1cc6971898c49b8b35710542083185d7e5fa95514e177217aa09feb9da2c75b0

    • SHA512

      ceea66690e3ded2a844d8c27b3cac8fe6766e857062c9cd4bfe8a1d572644e17069d11d15183882c3f1c14ac8e24230dff88792ca621aa3c19cc0119598bcce7

    • SSDEEP

      12288:jMqP8Tw6b7MP+Dd27VOVUAmoVJws3HVjwYQhlHbriMvXhI:jMY8TR7MP+h27lo7wKFfQ76+hI

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks