General

  • Target

    purchase request sheet.doc

  • Size

    1.2MB

  • Sample

    201214-2f48x7dfhn

  • MD5

    093ec9c7c51b43649d0658da435fc7f2

  • SHA1

    7a5b7eb7a46f25a0354e479bbe726565672e9ff3

  • SHA256

    5c755513f6bb355adb6e71b9970361b71191b987dbfa53a1fa4b79651b75fe15

  • SHA512

    3b55ae6e59bcd28ce04d753f4b800a80fcde5e2560d59936d57925a6e84eebfd4c2f926b924e4e9bc2df3297e69bcb1a5dc5924af251795cc3280be74b4dc9ff

Malware Config

Targets

    • Target

      purchase request sheet.doc

    • Size

      1.2MB

    • MD5

      093ec9c7c51b43649d0658da435fc7f2

    • SHA1

      7a5b7eb7a46f25a0354e479bbe726565672e9ff3

    • SHA256

      5c755513f6bb355adb6e71b9970361b71191b987dbfa53a1fa4b79651b75fe15

    • SHA512

      3b55ae6e59bcd28ce04d753f4b800a80fcde5e2560d59936d57925a6e84eebfd4c2f926b924e4e9bc2df3297e69bcb1a5dc5924af251795cc3280be74b4dc9ff

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks