General

  • Target

    CYBERARC.exe

  • Size

    24.0MB

  • Sample

    230713-baqgyaga6w

  • MD5

    0018815b6478cc3d609f8af29f35db80

  • SHA1

    d7396155a7754269668545c7a2a51739a2f742ef

  • SHA256

    dddfd9b570d0efe8e1675bcfec8cc1e9b1cda49d385c97bf6c3f357377f26335

  • SHA512

    36e231f4f561af66c4c0ab11525b56867fd9fc5cb6f9ebb0ad1300c65a9a95eb8c0caf075549bd4ae4efa398380fdffe17c16d8db5edcf88a3a91c867e3ff023

  • SSDEEP

    786432:IIEbJzd/6QWyvcRJxNglx/N4ioRPerfWYx+zCnkO:IIEFJ//cVmjIifLIA

Malware Config

Targets

    • Target

      CYBERARC.exe

    • Size

      24.0MB

    • MD5

      0018815b6478cc3d609f8af29f35db80

    • SHA1

      d7396155a7754269668545c7a2a51739a2f742ef

    • SHA256

      dddfd9b570d0efe8e1675bcfec8cc1e9b1cda49d385c97bf6c3f357377f26335

    • SHA512

      36e231f4f561af66c4c0ab11525b56867fd9fc5cb6f9ebb0ad1300c65a9a95eb8c0caf075549bd4ae4efa398380fdffe17c16d8db5edcf88a3a91c867e3ff023

    • SSDEEP

      786432:IIEbJzd/6QWyvcRJxNglx/N4ioRPerfWYx+zCnkO:IIEFJ//cVmjIifLIA

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader First Stage

    • Blocklisted process makes network request

    • Drops file in Drivers directory

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Registers COM server for autorun

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Installs/modifies Browser Helper Object

      BHOs are DLL modules which act as plugins for Internet Explorer.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks