General

  • Target

    5b05f07af95cd8ed7dcfc915bf955168ccb551e58df3b43342d5915e58185b83

  • Size

    205KB

  • Sample

    220802-brfztsefaj

  • MD5

    046a622e41c6d93a98a3478834bbe0b2

  • SHA1

    1eb4e567adcb63e318057de1a07a6e5df22db0f7

  • SHA256

    5b05f07af95cd8ed7dcfc915bf955168ccb551e58df3b43342d5915e58185b83

  • SHA512

    c95eeeaeea6e91c0f2dece089b139329978d266a860b6fd182fd3af3cb950bc712611b0ee81c2e4237eab9d9cfac2716dca9a2b8e63f490dffcfd985db9f20b1

Malware Config

Targets

    • Target

      5b05f07af95cd8ed7dcfc915bf955168ccb551e58df3b43342d5915e58185b83

    • Size

      205KB

    • MD5

      046a622e41c6d93a98a3478834bbe0b2

    • SHA1

      1eb4e567adcb63e318057de1a07a6e5df22db0f7

    • SHA256

      5b05f07af95cd8ed7dcfc915bf955168ccb551e58df3b43342d5915e58185b83

    • SHA512

      c95eeeaeea6e91c0f2dece089b139329978d266a860b6fd182fd3af3cb950bc712611b0ee81c2e4237eab9d9cfac2716dca9a2b8e63f490dffcfd985db9f20b1

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks