General

  • Target

    41f4ce65d92c76258a16482a2b660ee524b42695f668d93e23b3ddc57cde00e6

  • Size

    354KB

  • Sample

    221128-xw434saa73

  • MD5

    c662257308114e807cb6b437745c3b08

  • SHA1

    6fe2384d83cbcd37b3a3c5a863ccdcb78977b18b

  • SHA256

    41f4ce65d92c76258a16482a2b660ee524b42695f668d93e23b3ddc57cde00e6

  • SHA512

    81249c20aefca4085b0a2484ea68bdff9e05821a4900c17ba98848ed5e0f4c1291f7cd25d26ba9a0369f619a48556fa45eb902be5e60102c03ccc7ab2f425448

  • SSDEEP

    6144:qHUVKdUXp4WdapG8t2Dma25dzUUGHD6PvzV4mG15jbdNtIjHj3I8KGiZh5gUvmCH:qHvmsI80DmN59UaGPb/aTDI8hiZh5gq5

Malware Config

Targets

    • Target

      41f4ce65d92c76258a16482a2b660ee524b42695f668d93e23b3ddc57cde00e6

    • Size

      354KB

    • MD5

      c662257308114e807cb6b437745c3b08

    • SHA1

      6fe2384d83cbcd37b3a3c5a863ccdcb78977b18b

    • SHA256

      41f4ce65d92c76258a16482a2b660ee524b42695f668d93e23b3ddc57cde00e6

    • SHA512

      81249c20aefca4085b0a2484ea68bdff9e05821a4900c17ba98848ed5e0f4c1291f7cd25d26ba9a0369f619a48556fa45eb902be5e60102c03ccc7ab2f425448

    • SSDEEP

      6144:qHUVKdUXp4WdapG8t2Dma25dzUUGHD6PvzV4mG15jbdNtIjHj3I8KGiZh5gUvmCH:qHvmsI80DmN59UaGPb/aTDI8hiZh5gq5

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks