General

  • Target

    0745a0f64dfb16d50f30dc0f78ee32ce2e4b45eb808953a360f3c7f63e64e0bd

  • Size

    280KB

  • Sample

    221123-3kqdgacf59

  • MD5

    43aee386d7140d826569501b7d09ca8e

  • SHA1

    498f34b6b753b48f7c3276b1a0d55aee053a329a

  • SHA256

    0745a0f64dfb16d50f30dc0f78ee32ce2e4b45eb808953a360f3c7f63e64e0bd

  • SHA512

    4d181cf7e55b93c95cc2a32a01266ce0ea7f96ad9e4747e689539a2ec0764d4cde5d9f000531ee0e8377e576242e8fbb9ee10bdcb882f5302a169982ab87fdd4

  • SSDEEP

    6144:GG377xS2Vp2CeiorXdwTBgWx4/A9V53oipcCJJvHh:lr7xS2Vp6RwTyCmA9DbJJvHh

Malware Config

Targets

    • Target

      0745a0f64dfb16d50f30dc0f78ee32ce2e4b45eb808953a360f3c7f63e64e0bd

    • Size

      280KB

    • MD5

      43aee386d7140d826569501b7d09ca8e

    • SHA1

      498f34b6b753b48f7c3276b1a0d55aee053a329a

    • SHA256

      0745a0f64dfb16d50f30dc0f78ee32ce2e4b45eb808953a360f3c7f63e64e0bd

    • SHA512

      4d181cf7e55b93c95cc2a32a01266ce0ea7f96ad9e4747e689539a2ec0764d4cde5d9f000531ee0e8377e576242e8fbb9ee10bdcb882f5302a169982ab87fdd4

    • SSDEEP

      6144:GG377xS2Vp2CeiorXdwTBgWx4/A9V53oipcCJJvHh:lr7xS2Vp6RwTyCmA9DbJJvHh

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks