General

  • Target

    7738ee1d4ed0e0abd6de677cf29655fdac63f1f10c69b892fd8e509f0a14c3a6

  • Size

    109KB

  • Sample

    221201-k7g2hadd97

  • MD5

    ba173f99a9d352fafa445193d7b46110

  • SHA1

    ce43f8cb8ed504cd0e17abc57c499ce6292dfd18

  • SHA256

    7738ee1d4ed0e0abd6de677cf29655fdac63f1f10c69b892fd8e509f0a14c3a6

  • SHA512

    7157d9b2f4f20a25e8278c7eb573563ede394b32117b5bc0b3cb1ed0ca727d52807216bdfe8b28d6974d9da0223067ac0d025078a214947f9f35febf11c87e78

  • SSDEEP

    3072:zoy8j7VnNdrPHaSekwi+mW+2egjHBXcuQ/out:T8jZ7rvaU3+mWreIB8oS

Malware Config

Targets

    • Target

      7738ee1d4ed0e0abd6de677cf29655fdac63f1f10c69b892fd8e509f0a14c3a6

    • Size

      109KB

    • MD5

      ba173f99a9d352fafa445193d7b46110

    • SHA1

      ce43f8cb8ed504cd0e17abc57c499ce6292dfd18

    • SHA256

      7738ee1d4ed0e0abd6de677cf29655fdac63f1f10c69b892fd8e509f0a14c3a6

    • SHA512

      7157d9b2f4f20a25e8278c7eb573563ede394b32117b5bc0b3cb1ed0ca727d52807216bdfe8b28d6974d9da0223067ac0d025078a214947f9f35febf11c87e78

    • SSDEEP

      3072:zoy8j7VnNdrPHaSekwi+mW+2egjHBXcuQ/out:T8jZ7rvaU3+mWreIB8oS

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks