General

  • Target

    ad106e49d303452e29696eefdc651005c1d65c08f5b56e44a66a86f5f22acc84

  • Size

    402KB

  • Sample

    221128-gq9teaba36

  • MD5

    383dc6f79c142e4ea70a63f0719d28d7

  • SHA1

    a114ffb062c6542896186812fd8e81f541751d38

  • SHA256

    ad106e49d303452e29696eefdc651005c1d65c08f5b56e44a66a86f5f22acc84

  • SHA512

    ee2dbace8f564a2d5f3605ff072e9ca3a91a7173244991b840ad7607d0e3f2f7554bfd6fcaea091c5dc353dc3aa12dd563378c68ac5d7e1cfcfd6a3b1cb77099

  • SSDEEP

    6144:NXgNFADbdHvJwdndlbrYnmAREpN9YmP1crgxtPV75KJab03NpEmw2:NXgDADZJ8dl/QZRO7Yec0RH3Idw2

Malware Config

Targets

    • Target

      ad106e49d303452e29696eefdc651005c1d65c08f5b56e44a66a86f5f22acc84

    • Size

      402KB

    • MD5

      383dc6f79c142e4ea70a63f0719d28d7

    • SHA1

      a114ffb062c6542896186812fd8e81f541751d38

    • SHA256

      ad106e49d303452e29696eefdc651005c1d65c08f5b56e44a66a86f5f22acc84

    • SHA512

      ee2dbace8f564a2d5f3605ff072e9ca3a91a7173244991b840ad7607d0e3f2f7554bfd6fcaea091c5dc353dc3aa12dd563378c68ac5d7e1cfcfd6a3b1cb77099

    • SSDEEP

      6144:NXgNFADbdHvJwdndlbrYnmAREpN9YmP1crgxtPV75KJab03NpEmw2:NXgDADZJ8dl/QZRO7Yec0RH3Idw2

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VirtualBox drivers on disk

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks