General

  • Target

    036244e73f392c54c6c70107dd6563a3.exe

  • Size

    720KB

  • Sample

    231231-qg5b1abdg4

  • MD5

    036244e73f392c54c6c70107dd6563a3

  • SHA1

    6ce030303b1490b7c4dcae5ebe1787951a15ea06

  • SHA256

    174721f9d5861a0415a3128debaa2147ef10dab5552454b5da3e2ae7b01b8033

  • SHA512

    dfe0de63efe212f4a4e7b2edc9357e059b23c421c0b31344cd327e4fa6e7f89e03bdd13acdbcc71e9658c107e2c241eda968ae0dc8aff60bc3ccb9e71ef7d568

  • SSDEEP

    12288:0t31oSg+d+coajNNQGJ7dAjsVE6wpNIyDG:0tpd+coaRglpN6

Malware Config

Targets

    • Target

      036244e73f392c54c6c70107dd6563a3.exe

    • Size

      720KB

    • MD5

      036244e73f392c54c6c70107dd6563a3

    • SHA1

      6ce030303b1490b7c4dcae5ebe1787951a15ea06

    • SHA256

      174721f9d5861a0415a3128debaa2147ef10dab5552454b5da3e2ae7b01b8033

    • SHA512

      dfe0de63efe212f4a4e7b2edc9357e059b23c421c0b31344cd327e4fa6e7f89e03bdd13acdbcc71e9658c107e2c241eda968ae0dc8aff60bc3ccb9e71ef7d568

    • SSDEEP

      12288:0t31oSg+d+coajNNQGJ7dAjsVE6wpNIyDG:0tpd+coaRglpN6

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks