DADJOKE
Description
DADJOKE was discovered as being distributed via email, targeting a South-East Asian Ministry of Defense. It is delivered as an embedded EXE file in a Word document using remote templates and a unique macro using multiple GET requests. The payload is deployed using load-order hijacking with a benign Windows Defender executable. Stage 1 has only beacon+download functionality, made to look like a PNG file. Additional analysis by Kaspersky found 8 campaigns over 2019 and no activity prior to January 2019, DADJOKE is attributed with medium confidence to APT40.
Names
Name |
---|
DADJOKE |
Category
Malware
Type
- Backdoor
- Exfiltration
Information
Malpedia
Alienvault Otx
Other Information
Uuid
bfad0282-84d5-4135-84f1-24687684f5e5
Last Card Change
2021-04-24