General

  • Target

    dd251c331d2e29cf926836b77fa6992b0491b136acb24fa3485cd01e16d29f23

  • Size

    1.3MB

  • Sample

    221125-ns8sfshc81

  • MD5

    a236cad56a466ed2146b283aa5a140be

  • SHA1

    70c9a826c5e0d954a5a3661bd75146c51e7b7e6c

  • SHA256

    dd251c331d2e29cf926836b77fa6992b0491b136acb24fa3485cd01e16d29f23

  • SHA512

    4c2924f77176f754cc2110fa5e4436752923881617c4b1f9433697bbda0484f3aab2f72c20c695da4d096f7fff021f821fc5af623a4cfbc526d7b89a79f290bf

  • SSDEEP

    24576:pxkm2WbVJ4K6QXSzJu9G+iXZHI5Yj4HxoL/2UkjtJ+gkV:pxMUTj64SzJu0FIajWxoL+UkLm

Malware Config

Targets

    • Target

      dd251c331d2e29cf926836b77fa6992b0491b136acb24fa3485cd01e16d29f23

    • Size

      1.3MB

    • MD5

      a236cad56a466ed2146b283aa5a140be

    • SHA1

      70c9a826c5e0d954a5a3661bd75146c51e7b7e6c

    • SHA256

      dd251c331d2e29cf926836b77fa6992b0491b136acb24fa3485cd01e16d29f23

    • SHA512

      4c2924f77176f754cc2110fa5e4436752923881617c4b1f9433697bbda0484f3aab2f72c20c695da4d096f7fff021f821fc5af623a4cfbc526d7b89a79f290bf

    • SSDEEP

      24576:pxkm2WbVJ4K6QXSzJu9G+iXZHI5Yj4HxoL/2UkjtJ+gkV:pxMUTj64SzJu0FIajWxoL+UkLm

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

2
T1497

Tasks