General

  • Target

    04190447e027c00d2a5c7f9b46557c2ca40c7e2d173cd0e67ae73e13c5d5efea

  • Size

    111KB

  • Sample

    221127-fwpvrafd5v

  • MD5

    9543d0c7b56ec94ede6dd45f121ea267

  • SHA1

    52d540a1843359117f57c7f679cb268973e6be0f

  • SHA256

    04190447e027c00d2a5c7f9b46557c2ca40c7e2d173cd0e67ae73e13c5d5efea

  • SHA512

    620d038f775d7ff1684e3950cc46c8b8067af4d86f8aa2413a3e84ed58b9822e93614962d3da8842d1f1098b5dee895a1138c3c404e5e3c2b81dfb6735f8f233

  • SSDEEP

    3072:3oy8j7VnNdrPHaSekwi+mW+2FPgutOnout:n8jZ7rvaU3+mWrlsoS

Malware Config

Targets

    • Target

      04190447e027c00d2a5c7f9b46557c2ca40c7e2d173cd0e67ae73e13c5d5efea

    • Size

      111KB

    • MD5

      9543d0c7b56ec94ede6dd45f121ea267

    • SHA1

      52d540a1843359117f57c7f679cb268973e6be0f

    • SHA256

      04190447e027c00d2a5c7f9b46557c2ca40c7e2d173cd0e67ae73e13c5d5efea

    • SHA512

      620d038f775d7ff1684e3950cc46c8b8067af4d86f8aa2413a3e84ed58b9822e93614962d3da8842d1f1098b5dee895a1138c3c404e5e3c2b81dfb6735f8f233

    • SSDEEP

      3072:3oy8j7VnNdrPHaSekwi+mW+2FPgutOnout:n8jZ7rvaU3+mWrlsoS

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks