General

  • Target

    80112a1465755d890359f4f346858aaaf826b52b279fca10dfc2101eb77106e1

  • Size

    134KB

  • Sample

    221201-pjn75aff62

  • MD5

    6d1d5a6d8155b8d66e7bdec2882e71b6

  • SHA1

    0ac751a1d41a59f40cc0f6fd7723f050f76cba9c

  • SHA256

    80112a1465755d890359f4f346858aaaf826b52b279fca10dfc2101eb77106e1

  • SHA512

    6433150739962dec7eede77de70065ce4a8ad6a84213ce78d1c6cffd7135c70236793af8715b04655715b93860a8aacd1e1938c7f8be188e6719c0e76c5dbabc

  • SSDEEP

    3072:e106TCh4tKFwb4KxYb2JX5fPXvVVVnwx9S:6x5hxYb2JhX9nGS

Malware Config

Targets

    • Target

      80112a1465755d890359f4f346858aaaf826b52b279fca10dfc2101eb77106e1

    • Size

      134KB

    • MD5

      6d1d5a6d8155b8d66e7bdec2882e71b6

    • SHA1

      0ac751a1d41a59f40cc0f6fd7723f050f76cba9c

    • SHA256

      80112a1465755d890359f4f346858aaaf826b52b279fca10dfc2101eb77106e1

    • SHA512

      6433150739962dec7eede77de70065ce4a8ad6a84213ce78d1c6cffd7135c70236793af8715b04655715b93860a8aacd1e1938c7f8be188e6719c0e76c5dbabc

    • SSDEEP

      3072:e106TCh4tKFwb4KxYb2JX5fPXvVVVnwx9S:6x5hxYb2JhX9nGS

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

5
T1082

Tasks