General

  • Target

    b6a0458cdf737e39a1d73dd5479efbb519acf6aa537f5c2b00961c095528c77f

  • Size

    383KB

  • Sample

    221124-nfqfcadf5x

  • MD5

    47979ea88b490979d1014aabc70dd62d

  • SHA1

    e0008eb51583f3adf6c03410359cab9c8a31b43f

  • SHA256

    b6a0458cdf737e39a1d73dd5479efbb519acf6aa537f5c2b00961c095528c77f

  • SHA512

    07c0f60242881e39b2fc3adf4f21e07b8a6bd9e51617ae04cb4174f5a2da1e5b3602166f5d5f74805fc762c73ec743915113dafadabd95ac30b1032f82d9e384

  • SSDEEP

    6144:F2p66UIY1KvS9LMwJTv5m6kc8xJ7PRvcUrYPwg6WZCTdRYkPMMmTEoM:gp66ULQvSNMMTvnkc8xdPRvX4ZCTdRYw

Malware Config

Targets

    • Target

      b6a0458cdf737e39a1d73dd5479efbb519acf6aa537f5c2b00961c095528c77f

    • Size

      383KB

    • MD5

      47979ea88b490979d1014aabc70dd62d

    • SHA1

      e0008eb51583f3adf6c03410359cab9c8a31b43f

    • SHA256

      b6a0458cdf737e39a1d73dd5479efbb519acf6aa537f5c2b00961c095528c77f

    • SHA512

      07c0f60242881e39b2fc3adf4f21e07b8a6bd9e51617ae04cb4174f5a2da1e5b3602166f5d5f74805fc762c73ec743915113dafadabd95ac30b1032f82d9e384

    • SSDEEP

      6144:F2p66UIY1KvS9LMwJTv5m6kc8xJ7PRvcUrYPwg6WZCTdRYkPMMmTEoM:gp66ULQvSNMMTvnkc8xdPRvX4ZCTdRYw

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Looks for VirtualBox Guest Additions in registry

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Disables use of System Restore points

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

3
T1112

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Impact

Inhibit System Recovery

1
T1490

Tasks