General

  • Target

    b305d95fa833495eca1fa9ab824a25e0.exe

  • Size

    5.2MB

  • Sample

    210322-ms5tamgfws

  • MD5

    b305d95fa833495eca1fa9ab824a25e0

  • SHA1

    18a87991e98013678713cf231f37787ab0c87512

  • SHA256

    4d71bbe32ad8828d3ed66fb0ea352086181390391bab0960298fad620b61eee7

  • SHA512

    51ac574dd06ae8d267f400005b1c698fd2c3f1a50dc27afcc554bf7e836046f0fea6808f8e4cc4ebc827530bdbe6bc3cd949c27672e7770070e3aafdaa42110f

Malware Config

Targets

    • Target

      b305d95fa833495eca1fa9ab824a25e0.exe

    • Size

      5.2MB

    • MD5

      b305d95fa833495eca1fa9ab824a25e0

    • SHA1

      18a87991e98013678713cf231f37787ab0c87512

    • SHA256

      4d71bbe32ad8828d3ed66fb0ea352086181390391bab0960298fad620b61eee7

    • SHA512

      51ac574dd06ae8d267f400005b1c698fd2c3f1a50dc27afcc554bf7e836046f0fea6808f8e4cc4ebc827530bdbe6bc3cd949c27672e7770070e3aafdaa42110f

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader First Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks