Names | DADJOKE | |
Category | Malware | |
Type | Backdoor, Exfiltration | |
Description | DADJOKE was discovered as being distributed via email, targeting a South-East Asian Ministry of Defense. It is delivered as an embedded EXE file in a Word document using remote templates and a unique macro using multiple GET requests. The payload is deployed using load-order hijacking with a benign Windows Defender executable. Stage 1 has only beacon+download functionality, made to look like a PNG file. Additional analysis by Kaspersky found 8 campaigns over 2019 and no activity prior to January 2019, DADJOKE is attributed with medium confidence to APT40. | |
Information | <https://www.mycert.org.my/portal/advisory?id=MA-770.022020> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.dadjoke> | |
AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:DADJOKE> |
Last change to this tool card: 24 April 2021
Download this tool card in JSON format
Previous: Dacls RAT
Next: Dadstache
Changed | Name | Country | Observed | ||
APT groups | |||||
Leviathan, APT 40, TEMP.Periscope | 2013-Jul 2021 |
1 group listed (1 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |