General

  • Target

    e0cdfc07fda1d67f20d9e22439550795.exe

  • Size

    1.5MB

  • Sample

    210310-hmfhmss7mj

  • MD5

    e0cdfc07fda1d67f20d9e22439550795

  • SHA1

    38e753f0331e6bd2dcb39b87532e41253d4872e1

  • SHA256

    73b2da5f6faf24a5ab452699c277de166e2daf0a6b1b54c24f826004d9d09cc7

  • SHA512

    09eecf64c0b2cbeb01c063bc328848a20e3442c46fbf261100c5a26cf375baa9c5407e726314bed639975959548a2dede17f31eaba882fb958b758e62c4a84e4

Malware Config

Targets

    • Target

      e0cdfc07fda1d67f20d9e22439550795.exe

    • Size

      1.5MB

    • MD5

      e0cdfc07fda1d67f20d9e22439550795

    • SHA1

      38e753f0331e6bd2dcb39b87532e41253d4872e1

    • SHA256

      73b2da5f6faf24a5ab452699c277de166e2daf0a6b1b54c24f826004d9d09cc7

    • SHA512

      09eecf64c0b2cbeb01c063bc328848a20e3442c46fbf261100c5a26cf375baa9c5407e726314bed639975959548a2dede17f31eaba882fb958b758e62c4a84e4

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader First Stage

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Bootkit

1
T1067

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks