Behavioral task
behavioral1
Sample
ecb76617a8aa609ae9eb42e50b516145fa061645fbc9700ab294c75cf303357b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ecb76617a8aa609ae9eb42e50b516145fa061645fbc9700ab294c75cf303357b.exe
Resource
win10v2004-20220812-en
General
-
Target
ecb76617a8aa609ae9eb42e50b516145fa061645fbc9700ab294c75cf303357b
-
Size
1.0MB
-
MD5
a78b2948e43a73a409dc15c09eaebaeb
-
SHA1
2c5609fef93f10e3f30fc3453e6f7c680778699a
-
SHA256
ecb76617a8aa609ae9eb42e50b516145fa061645fbc9700ab294c75cf303357b
-
SHA512
22a1be03dab0b6e866c48bc91866ce66ba269a50bf6e0d44f4925fc9152db763781f759968a8648d9e764f91d3e205dc58654684ab05b549c7d9a228b6782554
-
SSDEEP
24576:E8/BzEyAlqTf2yn6sJvC7RR1EmXXTQUlTRWc+:Ew6gw7RfTdlTRWc+
Malware Config
Signatures
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule sample modiloader_stage2 -
Modiloader family
Files
-
ecb76617a8aa609ae9eb42e50b516145fa061645fbc9700ab294c75cf303357b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.nsp0 Size: 772KB - Virtual size: 772KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nsp1 Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.nsp2 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata2 Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE