General

  • Target

    b4b2e6ec0267e86d67f98579945dab90f08608d6248db8340b6a95ae86813226

  • Size

    350KB

  • Sample

    221004-bvc3cafecl

  • MD5

    33e4035e409d8b1f24f6dbb42fbac637

  • SHA1

    b1f91d896bf59b434cc164ea8dd440a82edbb543

  • SHA256

    b4b2e6ec0267e86d67f98579945dab90f08608d6248db8340b6a95ae86813226

  • SHA512

    7a68fe0be6e4ff29de7d9e563ddd3506d30a84fc76e1b57cc382db9043d54b44a5d61ad90352f1e8a957bc4b707e89584711ebfcbee926eed5d6a7df4002e08d

  • SSDEEP

    6144:vZFPzNJtUTidCOKQzHaHXrFnk8iEgxeBgOCF+dg384dyzKX/GUaokGd:vvPzNJtUTidCMa3Rnk8iHxeBcggdszKh

Malware Config

Targets

    • Target

      b4b2e6ec0267e86d67f98579945dab90f08608d6248db8340b6a95ae86813226

    • Size

      350KB

    • MD5

      33e4035e409d8b1f24f6dbb42fbac637

    • SHA1

      b1f91d896bf59b434cc164ea8dd440a82edbb543

    • SHA256

      b4b2e6ec0267e86d67f98579945dab90f08608d6248db8340b6a95ae86813226

    • SHA512

      7a68fe0be6e4ff29de7d9e563ddd3506d30a84fc76e1b57cc382db9043d54b44a5d61ad90352f1e8a957bc4b707e89584711ebfcbee926eed5d6a7df4002e08d

    • SSDEEP

      6144:vZFPzNJtUTidCOKQzHaHXrFnk8iEgxeBgOCF+dg384dyzKX/GUaokGd:vvPzNJtUTidCMa3Rnk8iHxeBcggdszKh

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks