General
-
Target
dca9c0d5b10ab8b01e4e60cfb4fb11f858d8c4c3d92ca2f20d80ae78b138f915.lnk
-
Size
528KB
-
Sample
230411-s1p3jadc85
-
MD5
bf42189c53d02d4618030d75659296f3
-
SHA1
bbff2942b885222d450c1579ca807faf6ffdbc42
-
SHA256
dca9c0d5b10ab8b01e4e60cfb4fb11f858d8c4c3d92ca2f20d80ae78b138f915
-
SHA512
f73042e3e0840c64952b0ccd7c32d6b3037fce0a3d2488032af799e48de5c4568865cc3a6fd2db00db83693661f70eca8e1548aa69acceca02ffc2b7af5b351d
-
SSDEEP
12:8MMlHm/3BVSXvk4RnK9hRNSWhW+UcZRNS/De9DGvAl7DiNL4t2YqlsXSkgK:8lo/ByKn8+/lMAyvAl7a5/Mhg
Static task
static1
Behavioral task
behavioral1
Sample
dca9c0d5b10ab8b01e4e60cfb4fb11f858d8c4c3d92ca2f20d80ae78b138f915.lnk
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dca9c0d5b10ab8b01e4e60cfb4fb11f858d8c4c3d92ca2f20d80ae78b138f915.lnk
Resource
win10v2004-20230221-en
Malware Config
Extracted
http://marcapinyo.ac.ug/url/knl/pay.hta
Extracted
vidar
3.4
c24cebaf477b8a7988497cf94e898888
https://steamcommunity.com/profiles/76561199494593681
https://t.me/auftriebs
-
profile_id_v2
c24cebaf477b8a7988497cf94e898888
-
user_agent
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0
Targets
-
-
Target
dca9c0d5b10ab8b01e4e60cfb4fb11f858d8c4c3d92ca2f20d80ae78b138f915.lnk
-
Size
528KB
-
MD5
bf42189c53d02d4618030d75659296f3
-
SHA1
bbff2942b885222d450c1579ca807faf6ffdbc42
-
SHA256
dca9c0d5b10ab8b01e4e60cfb4fb11f858d8c4c3d92ca2f20d80ae78b138f915
-
SHA512
f73042e3e0840c64952b0ccd7c32d6b3037fce0a3d2488032af799e48de5c4568865cc3a6fd2db00db83693661f70eca8e1548aa69acceca02ffc2b7af5b351d
-
SSDEEP
12:8MMlHm/3BVSXvk4RnK9hRNSWhW+UcZRNS/De9DGvAl7DiNL4t2YqlsXSkgK:8lo/ByKn8+/lMAyvAl7a5/Mhg
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-