General

  • Target

    cde659e7cf67676e78c075393ec2562e73b6739da9df9187b195b2a58158a5ae

  • Size

    442KB

  • Sample

    221129-v85jasba78

  • MD5

    2f8cd4ba2b9844213d8cd69bdbb0485b

  • SHA1

    13640f1735c6d97906985ee7dad0f5bf9ac9e394

  • SHA256

    cde659e7cf67676e78c075393ec2562e73b6739da9df9187b195b2a58158a5ae

  • SHA512

    2ce09a5cbe10ad0f62bb300ffde12c6b4f3f96cef49a2e0a85f6570fa73017256a4c5e8f085649129b3d30f740bcb24bb7aae947829d5b38f95eb4aeff287593

  • SSDEEP

    6144:TBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHQaEFmgYs2R3hSP1p7a1ZLcPR2GTJz:TBMmKGnhDT+JlCraEFmgqdwYA2GFz

Malware Config

Targets

    • Target

      cde659e7cf67676e78c075393ec2562e73b6739da9df9187b195b2a58158a5ae

    • Size

      442KB

    • MD5

      2f8cd4ba2b9844213d8cd69bdbb0485b

    • SHA1

      13640f1735c6d97906985ee7dad0f5bf9ac9e394

    • SHA256

      cde659e7cf67676e78c075393ec2562e73b6739da9df9187b195b2a58158a5ae

    • SHA512

      2ce09a5cbe10ad0f62bb300ffde12c6b4f3f96cef49a2e0a85f6570fa73017256a4c5e8f085649129b3d30f740bcb24bb7aae947829d5b38f95eb4aeff287593

    • SSDEEP

      6144:TBgh/58KGip9lmh0UwwDdxtPw13OyhFR8uHQaEFmgYs2R3hSP1p7a1ZLcPR2GTJz:TBMmKGnhDT+JlCraEFmgqdwYA2GFz

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks