General

  • Target

    b2b3b9900857b05b65148603ca063bbb684a53912dbf1499f561f212bd8e3e83

  • Size

    424KB

  • Sample

    221001-185rysbbbn

  • MD5

    69da7bfc663efb0653ef020e17023f06

  • SHA1

    3857b4b35eeeec7f3df96d5557f737be18c2e513

  • SHA256

    b2b3b9900857b05b65148603ca063bbb684a53912dbf1499f561f212bd8e3e83

  • SHA512

    4d09fb4c8b15a4a5af013952d100c3d9afb7c5a0fcc99bc1fda5bce0c35e1836c40c424d51c770a346cc093a11cd1f1b481055a289062546f902053e214c3924

  • SSDEEP

    12288:QzHypOkQuQ8ukplnRcmHxyeIWNUuqMd1+aBdN:StkHQ8BVcyu/uq6BdN

Malware Config

Targets

    • Target

      b2b3b9900857b05b65148603ca063bbb684a53912dbf1499f561f212bd8e3e83

    • Size

      424KB

    • MD5

      69da7bfc663efb0653ef020e17023f06

    • SHA1

      3857b4b35eeeec7f3df96d5557f737be18c2e513

    • SHA256

      b2b3b9900857b05b65148603ca063bbb684a53912dbf1499f561f212bd8e3e83

    • SHA512

      4d09fb4c8b15a4a5af013952d100c3d9afb7c5a0fcc99bc1fda5bce0c35e1836c40c424d51c770a346cc093a11cd1f1b481055a289062546f902053e214c3924

    • SSDEEP

      12288:QzHypOkQuQ8ukplnRcmHxyeIWNUuqMd1+aBdN:StkHQ8BVcyu/uq6BdN

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks