General

  • Target

    04778872ebfe19afd240d9242b58e7b6236c199d7edf3c21c974e40998ae0f1c

  • Size

    116KB

  • Sample

    221127-dj2bxahh2w

  • MD5

    ef17d21ad9cdab3c972b9e925b1ceb33

  • SHA1

    46358cea22fefaa33bd27a004b2e7903cbbf6190

  • SHA256

    04778872ebfe19afd240d9242b58e7b6236c199d7edf3c21c974e40998ae0f1c

  • SHA512

    33d3eecf88f984c5689ee1c33bb412089c81c4a52df81ad6d8038bd0533f370354bf55b0dc89eb8c8fdd0916a070d97612c2eb75901ecf7f44fb21f4bbb7f83c

  • SSDEEP

    3072:CKjMubeiPfNEtjiJCxGGd/6Gh2CQeBnXvQfoyEaG:CKjbeZhJGGxh2nGXvQAxaG

Malware Config

Targets

    • Target

      04778872ebfe19afd240d9242b58e7b6236c199d7edf3c21c974e40998ae0f1c

    • Size

      116KB

    • MD5

      ef17d21ad9cdab3c972b9e925b1ceb33

    • SHA1

      46358cea22fefaa33bd27a004b2e7903cbbf6190

    • SHA256

      04778872ebfe19afd240d9242b58e7b6236c199d7edf3c21c974e40998ae0f1c

    • SHA512

      33d3eecf88f984c5689ee1c33bb412089c81c4a52df81ad6d8038bd0533f370354bf55b0dc89eb8c8fdd0916a070d97612c2eb75901ecf7f44fb21f4bbb7f83c

    • SSDEEP

      3072:CKjMubeiPfNEtjiJCxGGd/6Gh2CQeBnXvQfoyEaG:CKjbeZhJGGxh2nGXvQAxaG

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks