General

  • Target

    5c13b651cd1ef182c540f59c80aa16d0b44936728154e47658af0f6492cec74e

  • Size

    701KB

  • Sample

    220801-s6etrabef7

  • MD5

    8df4a011b568d51b6664fb8c4043c001

  • SHA1

    d23aab5c709f9848a2279a753b42b4772ffd74af

  • SHA256

    5c13b651cd1ef182c540f59c80aa16d0b44936728154e47658af0f6492cec74e

  • SHA512

    2aea00505a66d57b108c8fd316a2bd4bf10c2d48e3590c523f45b834e4bf53a1c797b6110929024b7de870643806deec29c9a799145af44e849dbce9cd070c63

Score
10/10

Malware Config

Targets

    • Target

      5c13b651cd1ef182c540f59c80aa16d0b44936728154e47658af0f6492cec74e

    • Size

      701KB

    • MD5

      8df4a011b568d51b6664fb8c4043c001

    • SHA1

      d23aab5c709f9848a2279a753b42b4772ffd74af

    • SHA256

      5c13b651cd1ef182c540f59c80aa16d0b44936728154e47658af0f6492cec74e

    • SHA512

      2aea00505a66d57b108c8fd316a2bd4bf10c2d48e3590c523f45b834e4bf53a1c797b6110929024b7de870643806deec29c9a799145af44e849dbce9cd070c63

    Score
    10/10
    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Deletes itself

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks