General

  • Target

    Fmywfytcpwdmvi.exe

  • Size

    707KB

  • Sample

    230412-py3dasdg4y

  • MD5

    3df32efa05c88263b4ab0001b5b86aca

  • SHA1

    aa936331daad999b8561df9163f46c15be8272d4

  • SHA256

    94aa407f90054e51d00b6c555ef7b566944290e990f3790bf18579afe0cf60b2

  • SHA512

    6702cf703c845f411f34c742b8585ead12d76e7c01dfd075c77bd068a8585b438189b38331d1502d23cbab55aae1daa56afcffdd2242e5838dfd3291aa8cadd4

  • SSDEEP

    12288:3lSLbFGyI6Lr4x6xsRzNgBlAU94uq43B2VrNoSv:VuL4xSsRzNgOuTx2VBv

Malware Config

Targets

    • Target

      Fmywfytcpwdmvi.exe

    • Size

      707KB

    • MD5

      3df32efa05c88263b4ab0001b5b86aca

    • SHA1

      aa936331daad999b8561df9163f46c15be8272d4

    • SHA256

      94aa407f90054e51d00b6c555ef7b566944290e990f3790bf18579afe0cf60b2

    • SHA512

      6702cf703c845f411f34c742b8585ead12d76e7c01dfd075c77bd068a8585b438189b38331d1502d23cbab55aae1daa56afcffdd2242e5838dfd3291aa8cadd4

    • SSDEEP

      12288:3lSLbFGyI6Lr4x6xsRzNgBlAU94uq43B2VrNoSv:VuL4xSsRzNgOuTx2VBv

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks