General
-
Target
1b0be50f700de57af68f6ed4c97f2b3a8e28ea5ab4bcd977aa6799553803edba
-
Size
709KB
-
Sample
230210-cv1dbaeg3v
-
MD5
e27fbadf3b4c680755af9286b4b6cf6b
-
SHA1
cfa2a558737840f956c7726c905b64fec5c2b472
-
SHA256
1b0be50f700de57af68f6ed4c97f2b3a8e28ea5ab4bcd977aa6799553803edba
-
SHA512
34391dfdc5dc1c5f8e1437b590cae7fdfa93c3e95a3c4bde32b581b5c1a5527e5c9372859d14be752fd7252d52ace2cce550f79742fd879e9096d92f5aefc65c
-
SSDEEP
12288:jBL6dBqd7X5BqO2VaHuD/etbrU9+/vqy5g7i+zAXrc:1WyXvqOiaHuD/eRa+/vt5F+zy
Static task
static1
Behavioral task
behavioral1
Sample
1b0be50f700de57af68f6ed4c97f2b3a8e28ea5ab4bcd977aa6799553803edba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1b0be50f700de57af68f6ed4c97f2b3a8e28ea5ab4bcd977aa6799553803edba.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
formbook
nvp4
EiywrQNofDNveWY1IESoBA==
yqEWFGRfErX7ICQCwyQ+YeLXtaA=
Ers0rc50nbjso0jbdZTmBw==
XQxVP45+F5OZn3ZBTC7MLe1OF3G5c5uK9A==
RHh4uwtsttjzlxy+eW3+
W+xQshfnvmF5n5x2d+cEVdBNIkQRHRE=
FwlyiuXNX0+Trw==
euLn91on/7DeDe++zbQ4YeLXtaA=
td4cO8m3HDRWtl8p7Q==
ZrlyAAPqc3GXI5k=
OM0IisKOI78FJC/IuIxxAu5nRg==
d6A0QJ6PV+AOpyK+eW3+
+EgxFWUu3Ulatl8p7Q==
GC/stck1ILXn+cWZx7w8W6rPFmO6c5uK9A==
hhIiK4+CKEOfB4tr
mA1pyQ85ye8N
4xgWYcEpEoidv8eXKNncAQ==
L+hOVbe+IWyc8oVUclc=
J7EGaJ+L+wKLXUYg7w==
L5R/nfdgQdMHD+TUKw1Zo3Hb
E4z2kWG/vE6yt5E=
+efGEVp82EycSL2U4cpFU2an/aM5SDuF
6zA2kAqIdAQKkve6y7RjtRBf+i8Nvw==
VRqXzvXLVF+hS9arybBihGeOTaKP
PgKByBDCpL4cd9+yO52n/xZmQZeF
pMit5lre4GVyi3xcfywQY58=
F/vD9x4Oz0RWtl8p7Q==
hvZhvTgp/H7Lm2RNdl0=
h/xWhNLDOEpSZUTmIguoBA==
o8qw6kCdiDV4kn1FMZ6et06V+dCQZEmG
bgMOGYox8vMQ
YmFKj+ZWVRBcep49cl0=
Wox2hOnIRnGp3s2RMZ9Zo3Hb
eeTk5zCrpCpSyntTeF0=
FOA7J3NsxuomwEARYVLNU1TR
yuLXKrWb72SKrA==
K6T6LoiKKwZrHY5i
B8UkEkol7nBvrLeOjSwQY58=
GwvWc8gVAk6yt5E=
4IboPYD24Hqi5mxf+g==
L4XQI2A00QtXxxi+eW3+
doMqp/ZMkE6yt5E=
1ebXKoTs0GSYqMZZc1U=
CYnoUKIiG5vI4/HHLNXpCw==
P/FwuirU0FeJxseeKNncAQ==
N21GaMlCYhFbtl8p7Q==
KY95j+NDjk6yt5E=
C/rJL7ACO0yfB4tr
z6QDKYo85+nxAx+zmTgBLYY=
IPBjddXCgzlvd2Y/C3KaMomhUQ==
KNsyKXJjN+wYPi8OLgNZo3Hb
kht0meHAHPpzqQ==
Rm5BMnxa1/s/yxq2wSJcfpc=
+Tn9l2Ax8vMQ
rwkQV4ruG7v1/s+ZKNncAQ==
7+RhcuhVYBpggr5YZUw=
YRaX4klS4xWfB4tr
YIZ5wgZjYOsslloz9A==
+SAdmP/smDZ6oKF4GxNZo3Hb
mSIWBEa/uz9JSodz
PGc0UrsbRk1LwHVWOp+9CQ==
DnJQctQ5jE6yt5E=
gYmlw+nLOxtYl4k=
eRJtqhQDH3KQsg==
brainbookgroup.com
Targets
-
-
Target
1b0be50f700de57af68f6ed4c97f2b3a8e28ea5ab4bcd977aa6799553803edba
-
Size
709KB
-
MD5
e27fbadf3b4c680755af9286b4b6cf6b
-
SHA1
cfa2a558737840f956c7726c905b64fec5c2b472
-
SHA256
1b0be50f700de57af68f6ed4c97f2b3a8e28ea5ab4bcd977aa6799553803edba
-
SHA512
34391dfdc5dc1c5f8e1437b590cae7fdfa93c3e95a3c4bde32b581b5c1a5527e5c9372859d14be752fd7252d52ace2cce550f79742fd879e9096d92f5aefc65c
-
SSDEEP
12288:jBL6dBqd7X5BqO2VaHuD/etbrU9+/vqy5g7i+zAXrc:1WyXvqOiaHuD/eRa+/vt5F+zy
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-