General
-
Target
218a0ceebeae56f564fe4103e92fd17cba63081744e3e02e5f4bb7cf1dd8586b
-
Size
446KB
-
Sample
221004-cwy7mshbb9
-
MD5
36615d0dc4631c60ecd8ba4b4f5078df
-
SHA1
b0eebb0cac24bb225ff95c2086eae7a96c9a7850
-
SHA256
218a0ceebeae56f564fe4103e92fd17cba63081744e3e02e5f4bb7cf1dd8586b
-
SHA512
d1f7ee13d3fcdfe37cb520abb9d94adb6d5f887649c11275c3be6a1ad0b12af52be0cc14dddeb252c05ce43cb390248873f4bdd264ef3947ee2d18ab2377ad86
-
SSDEEP
6144:V5BXKQRp4aFi1OgWKDoQCDokkdR6txkBK/cRqHoQ7FlK1V3:/BXKQV41hJakqiGcwHoqFad
Static task
static1
Behavioral task
behavioral1
Sample
218a0ceebeae56f564fe4103e92fd17cba63081744e3e02e5f4bb7cf1dd8586b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
218a0ceebeae56f564fe4103e92fd17cba63081744e3e02e5f4bb7cf1dd8586b.exe
Resource
win10v2004-20220812-en
Malware Config
Targets
-
-
Target
218a0ceebeae56f564fe4103e92fd17cba63081744e3e02e5f4bb7cf1dd8586b
-
Size
446KB
-
MD5
36615d0dc4631c60ecd8ba4b4f5078df
-
SHA1
b0eebb0cac24bb225ff95c2086eae7a96c9a7850
-
SHA256
218a0ceebeae56f564fe4103e92fd17cba63081744e3e02e5f4bb7cf1dd8586b
-
SHA512
d1f7ee13d3fcdfe37cb520abb9d94adb6d5f887649c11275c3be6a1ad0b12af52be0cc14dddeb252c05ce43cb390248873f4bdd264ef3947ee2d18ab2377ad86
-
SSDEEP
6144:V5BXKQRp4aFi1OgWKDoQCDokkdR6txkBK/cRqHoQ7FlK1V3:/BXKQV41hJakqiGcwHoqFad
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VirtualBox drivers on disk
-
ModiLoader Second Stage
-
Adds policy Run key to start application
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-