Behavioral task
behavioral1
Sample
e9dd050678b3dd59aaae07cc40bebd35205017e028224dda7818ad83eb47351b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e9dd050678b3dd59aaae07cc40bebd35205017e028224dda7818ad83eb47351b.exe
Resource
win10v2004-20221111-en
General
-
Target
e9dd050678b3dd59aaae07cc40bebd35205017e028224dda7818ad83eb47351b
-
Size
948KB
-
MD5
8a6eb6dae30ed7bed49e27c3baf3cd05
-
SHA1
ce96de2c741e7797f4fcd820f77e8c242cfe0e69
-
SHA256
e9dd050678b3dd59aaae07cc40bebd35205017e028224dda7818ad83eb47351b
-
SHA512
ee158ac3e9abb53e362256a96784b5ee38bfef9b1416a8413ed1b56a4b786f714c45ebed8144bd4208073581a8b9152567cfbf795420e2f69b36e632610602f6
-
SSDEEP
24576:9oK9U9Z5Y4+YSembcj3jtpTm7bUDWzPuNML851cM9wAYy:9oQU9Z5Y4+YSembcj3jjTcDuNML851cZ
Malware Config
Signatures
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule sample modiloader_stage2 -
Modiloader family
-
Processes:
resource yara_rule sample upx
Files
-
e9dd050678b3dd59aaae07cc40bebd35205017e028224dda7818ad83eb47351b.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 868KB - Virtual size: 868KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE