General

  • Target

    8025862cbd5f0613efc14ef524e8f52122d05c46d604b7364cbc7cf78cdd94c3

  • Size

    816KB

  • Sample

    221205-qj2c5adb46

  • MD5

    0be660bca87744eaac376adbf87d8452

  • SHA1

    ca9db747e49b36719503cc680634c837ca4d53fe

  • SHA256

    8025862cbd5f0613efc14ef524e8f52122d05c46d604b7364cbc7cf78cdd94c3

  • SHA512

    528655ddae0315db9a2044285a3e02acc94ba8d10474df9a3d5b0ecf240d9f9dc0aded1cff898e384fd880bcb9ee9fa8dfab00853c3fac9c9347e35ee2d796c9

  • SSDEEP

    12288:l34MLyXqdI9PKoC7eKvTe6vbiNW5TndVdFLiWMRunLxRcvDdvm6Lzh/nFS0q6SP+:l859kyoiNcTn1dpMRuLxRi+6xMJ+

Malware Config

Targets

    • Target

      8025862cbd5f0613efc14ef524e8f52122d05c46d604b7364cbc7cf78cdd94c3

    • Size

      816KB

    • MD5

      0be660bca87744eaac376adbf87d8452

    • SHA1

      ca9db747e49b36719503cc680634c837ca4d53fe

    • SHA256

      8025862cbd5f0613efc14ef524e8f52122d05c46d604b7364cbc7cf78cdd94c3

    • SHA512

      528655ddae0315db9a2044285a3e02acc94ba8d10474df9a3d5b0ecf240d9f9dc0aded1cff898e384fd880bcb9ee9fa8dfab00853c3fac9c9347e35ee2d796c9

    • SSDEEP

      12288:l34MLyXqdI9PKoC7eKvTe6vbiNW5TndVdFLiWMRunLxRcvDdvm6Lzh/nFS0q6SP+:l859kyoiNcTn1dpMRuLxRi+6xMJ+

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks