General

  • Target

    d1ed37e11649c0aa6f3157db3f177d6d39a511c7d9c81f93331c151d50a94e7e

  • Size

    363KB

  • Sample

    221203-m9lhtaeb36

  • MD5

    9b57b8167c387120e400bc2d2d295d21

  • SHA1

    af2b377710c7b689ef1520b37fe9e3e641f241bf

  • SHA256

    d1ed37e11649c0aa6f3157db3f177d6d39a511c7d9c81f93331c151d50a94e7e

  • SHA512

    fbf8f9829d9b34632d1cec81fb6bcccd21db820693204f4adde709a5f6940e635287fe184e4dc16cb535b6936fa5bd0efac74530e5fd0b8f1665518cb5087df4

  • SSDEEP

    6144:mV+bJLRLuYhOD63ut7JLVs73L9BDt2DJBCg7CdU16Ih7+2eXyrg31SqA1hEsQXzP:0+NLsxKC7+2eR31S31hEsQXz/SER7PJ

Malware Config

Targets

    • Target

      d1ed37e11649c0aa6f3157db3f177d6d39a511c7d9c81f93331c151d50a94e7e

    • Size

      363KB

    • MD5

      9b57b8167c387120e400bc2d2d295d21

    • SHA1

      af2b377710c7b689ef1520b37fe9e3e641f241bf

    • SHA256

      d1ed37e11649c0aa6f3157db3f177d6d39a511c7d9c81f93331c151d50a94e7e

    • SHA512

      fbf8f9829d9b34632d1cec81fb6bcccd21db820693204f4adde709a5f6940e635287fe184e4dc16cb535b6936fa5bd0efac74530e5fd0b8f1665518cb5087df4

    • SSDEEP

      6144:mV+bJLRLuYhOD63ut7JLVs73L9BDt2DJBCg7CdU16Ih7+2eXyrg31SqA1hEsQXzP:0+NLsxKC7+2eR31S31hEsQXz/SER7PJ

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Tasks