General

  • Target

    24d386f1a6701b65fedd0810aaaf3f130bcb96e3f22b0eefd1865d9f16b70d81

  • Size

    344KB

  • Sample

    221003-3g2mbsccb3

  • MD5

    37538d37005b00fdc06025095744c0ab

  • SHA1

    ce91b54b84d9d33e6c285157cd36feea0e8fee27

  • SHA256

    24d386f1a6701b65fedd0810aaaf3f130bcb96e3f22b0eefd1865d9f16b70d81

  • SHA512

    3b37b26ccae3a2e3ecb360b48c5b8e2bc90f885283b20ee4d840e937ad97dafc709dfa41e3cd2efa1e969a5f7258b279931dfc92c84cda812bc149825c5c8a1e

  • SSDEEP

    6144:xOnQLHDrONnDhn0Md4oSVMRrxhAAsitIyDjQxskpH8Q5uJcroeWpQoMUyFfCPiIY:xaQLjrONn9uv8thtsitIqpkqQDrpWp23

Malware Config

Targets

    • Target

      24d386f1a6701b65fedd0810aaaf3f130bcb96e3f22b0eefd1865d9f16b70d81

    • Size

      344KB

    • MD5

      37538d37005b00fdc06025095744c0ab

    • SHA1

      ce91b54b84d9d33e6c285157cd36feea0e8fee27

    • SHA256

      24d386f1a6701b65fedd0810aaaf3f130bcb96e3f22b0eefd1865d9f16b70d81

    • SHA512

      3b37b26ccae3a2e3ecb360b48c5b8e2bc90f885283b20ee4d840e937ad97dafc709dfa41e3cd2efa1e969a5f7258b279931dfc92c84cda812bc149825c5c8a1e

    • SSDEEP

      6144:xOnQLHDrONnDhn0Md4oSVMRrxhAAsitIyDjQxskpH8Q5uJcroeWpQoMUyFfCPiIY:xaQLjrONn9uv8thtsitIqpkqQDrpWp23

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Virtualization/Sandbox Evasion

3
T1497

Modify Registry

3
T1112

Discovery

Software Discovery

1
T1518

Query Registry

4
T1012

Virtualization/Sandbox Evasion

3
T1497

File and Directory Discovery

1
T1083

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks