General

  • Target

    Kopija bankovne uplate.exe

  • Size

    2.2MB

  • Sample

    231127-lbb12sff29

  • MD5

    2effcfc08d769d5a45ec793864013d1f

  • SHA1

    a5ee4caf50df0611dffccc21ee7cc12e2fcce6b6

  • SHA256

    7056d549ba61408c2967bd1b277aad3134ab22afda1ef861c238f2c5598c3420

  • SHA512

    3fe98186ada1d72ab1fb5a9bbfc1d631bfd6ae780439f6e5e5cfcf93042ee41c9162e148ee3a5161481a3b9f6d914babf146ae328ebe83a786a8e58908156ae3

  • SSDEEP

    49152:JWPpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41+Fehg1mQmPoE:JCpcyV/wjpdZrxEVEtI14kqnLPoE

Malware Config

Targets

    • Target

      Kopija bankovne uplate.exe

    • Size

      2.2MB

    • MD5

      2effcfc08d769d5a45ec793864013d1f

    • SHA1

      a5ee4caf50df0611dffccc21ee7cc12e2fcce6b6

    • SHA256

      7056d549ba61408c2967bd1b277aad3134ab22afda1ef861c238f2c5598c3420

    • SHA512

      3fe98186ada1d72ab1fb5a9bbfc1d631bfd6ae780439f6e5e5cfcf93042ee41c9162e148ee3a5161481a3b9f6d914babf146ae328ebe83a786a8e58908156ae3

    • SSDEEP

      49152:JWPpH8yc0/wU2lpe63ZrxKrVEbRIqiPt41+Fehg1mQmPoE:JCpcyV/wjpdZrxEVEtI14kqnLPoE

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Tasks