General

  • Target

    5c8eb9807811e24c3a340c6723fdf19a172be7d0db07562d24ce4f9d64f83ec2

  • Size

    1.7MB

  • Sample

    231127-emxzbseb4w

  • MD5

    94e9433821086126b96aaa5d5c0f5295

  • SHA1

    73939bf96ba7301c161b9262a35e4d05d51e797b

  • SHA256

    5c8eb9807811e24c3a340c6723fdf19a172be7d0db07562d24ce4f9d64f83ec2

  • SHA512

    edb95474c2b8c5313e2f5f089fef70e57c2d1435dbba729189d68ffb53fe8c616994244d10e35954b0e89ffec439c556d92f96c89e94d1b4d26f002035e6c0e1

  • SSDEEP

    49152:h5SaYH0LBoNzxSGnGm8mgNzDpLNmPOEz9x/B:h5DYUdoCQGm8mgNzDqPJzXJ

Malware Config

Targets

    • Target

      Kopija bankovne uplate.exe

    • Size

      2.2MB

    • MD5

      2effcfc08d769d5a45ec793864013d1f

    • SHA1

      a5ee4caf50df0611dffccc21ee7cc12e2fcce6b6

    • SHA256

      7056d549ba61408c2967bd1b277aad3134ab22afda1ef861c238f2c5598c3420

    • SHA512

      3fe98186ada1d72ab1fb5a9bbfc1d631bfd6ae780439f6e5e5cfcf93042ee41c9162e148ee3a5161481a3b9f6d914babf146ae328ebe83a786a8e58908156ae3

    • SSDEEP

      49152:JWPpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41+Fehg1mQmPoE:JCpcyV/wjpdZrxEVEtI14kqnLPoE

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Tasks