General

  • Target

    0d0dc130f51749ea3e0efad156203217.exe

  • Size

    1.3MB

  • Sample

    210311-5nhwd5b6ls

  • MD5

    0d0dc130f51749ea3e0efad156203217

  • SHA1

    2028c197c019c51e6ee10630dd45414319a677e6

  • SHA256

    620afc2abbee35a3927169681326c1f1800030fd02c77eef6a49550978a41257

  • SHA512

    718910fd0aa7182d6dd49a63c5d8428fc789b9141a9675cbc2f156c02dc85b00d859f4d49698d9ab1b034ddf40ee68a9aa5a2a254f1eb87d3748b30500557fce

Malware Config

Targets

    • Target

      0d0dc130f51749ea3e0efad156203217.exe

    • Size

      1.3MB

    • MD5

      0d0dc130f51749ea3e0efad156203217

    • SHA1

      2028c197c019c51e6ee10630dd45414319a677e6

    • SHA256

      620afc2abbee35a3927169681326c1f1800030fd02c77eef6a49550978a41257

    • SHA512

      718910fd0aa7182d6dd49a63c5d8428fc789b9141a9675cbc2f156c02dc85b00d859f4d49698d9ab1b034ddf40ee68a9aa5a2a254f1eb87d3748b30500557fce

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader First Stage

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks