General

  • Target

    704402fbf64510e2bb2196be7885fe6610d8dc5ccb44fe3b3d70709505a9a12c

  • Size

    132KB

  • Sample

    221125-phr8dsga77

  • MD5

    64d4ca887876be25e89bad93d654e239

  • SHA1

    4dd0e735a37d20870b5543b03bd6ae82b532cdaf

  • SHA256

    704402fbf64510e2bb2196be7885fe6610d8dc5ccb44fe3b3d70709505a9a12c

  • SHA512

    6c062d89c322506aaaa343c78d0e2614fa892edeab901f5e0c24e16a46d862355efb224a7020f741c33fc90b0ed042a36b822c4f7b82e6e60bfd5efb64ca7234

  • SSDEEP

    3072:a1+MJKrUnFYY5z1i0Nmbi5fJBNr/i5jS7outxXPg:aIrPj0NmWtNr/i5WoSxXP

Malware Config

Targets

    • Target

      704402fbf64510e2bb2196be7885fe6610d8dc5ccb44fe3b3d70709505a9a12c

    • Size

      132KB

    • MD5

      64d4ca887876be25e89bad93d654e239

    • SHA1

      4dd0e735a37d20870b5543b03bd6ae82b532cdaf

    • SHA256

      704402fbf64510e2bb2196be7885fe6610d8dc5ccb44fe3b3d70709505a9a12c

    • SHA512

      6c062d89c322506aaaa343c78d0e2614fa892edeab901f5e0c24e16a46d862355efb224a7020f741c33fc90b0ed042a36b822c4f7b82e6e60bfd5efb64ca7234

    • SSDEEP

      3072:a1+MJKrUnFYY5z1i0Nmbi5fJBNr/i5jS7outxXPg:aIrPj0NmWtNr/i5WoSxXP

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks