DADJOKE

Description

DADJOKE was discovered as being distributed via email, targeting a South-East Asian Ministry of Defense. It is delivered as an embedded EXE file in a Word document using remote templates and a unique macro using multiple GET requests. The payload is deployed using load-order hijacking with a benign Windows Defender executable. Stage 1 has only beacon+download functionality, made to look like a PNG file. Additional analysis by Kaspersky found 8 campaigns over 2019 and no activity prior to January 2019, DADJOKE is attributed with medium confidence to APT40.

Names

Name
DADJOKE

Category

Malware

Type

  • Backdoor
  • Exfiltration

Information

Malpedia

Alienvault Otx

Other Information

Uuid

bfad0282-84d5-4135-84f1-24687684f5e5

Last Card Change

2021-04-24