General

  • Target

    e3c0c7ad1961509ebdac89eab246ad94fa45587c38fe4db90e1191aec4826c53

  • Size

    270KB

  • Sample

    221123-3j8hnacf37

  • MD5

    196ee4fdfe6133566824023b792e699b

  • SHA1

    6fca296db9e3a4b695674fb6216d38c56c7eecbc

  • SHA256

    e3c0c7ad1961509ebdac89eab246ad94fa45587c38fe4db90e1191aec4826c53

  • SHA512

    d32344d2893bdd3c7accaccfe7958b6b8199714c4188239f4df66176e40c72f2d05189c9fc13d79831cafba12ed98585c73130d3334047edc3e49747471852a8

  • SSDEEP

    6144:3G377xS2Vp2CeiorXdwTBgWx4v53cpcCJJvHQ:2r7xS2Vp6RwTyClbJJvHQ

Malware Config

Targets

    • Target

      e3c0c7ad1961509ebdac89eab246ad94fa45587c38fe4db90e1191aec4826c53

    • Size

      270KB

    • MD5

      196ee4fdfe6133566824023b792e699b

    • SHA1

      6fca296db9e3a4b695674fb6216d38c56c7eecbc

    • SHA256

      e3c0c7ad1961509ebdac89eab246ad94fa45587c38fe4db90e1191aec4826c53

    • SHA512

      d32344d2893bdd3c7accaccfe7958b6b8199714c4188239f4df66176e40c72f2d05189c9fc13d79831cafba12ed98585c73130d3334047edc3e49747471852a8

    • SSDEEP

      6144:3G377xS2Vp2CeiorXdwTBgWx4v53cpcCJJvHQ:2r7xS2Vp6RwTyClbJJvHQ

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks