General

  • Target

    847277818be6f8db7ab5eacbc92a3d2c

  • Size

    144KB

  • Sample

    240131-pyn6nsecdn

  • MD5

    847277818be6f8db7ab5eacbc92a3d2c

  • SHA1

    7ba5c5dff0dab39a75c2021e54a015cd9b978ec1

  • SHA256

    29a76ebacc5b1771013dfa32a9c2f7c619db969389fb54bc938e7cce29cde026

  • SHA512

    7fa42a545262035eb5f7219e0b15d4105e63c83e4137928c1dfc63c868665289782ea9e84d0835a1f5ecd4652a633e93df9fbee821849eac3654d664bfc7aeec

  • SSDEEP

    3072:/uE51ig/x0HudC9iFYS/qwoKSErBMlAzXXiZUrYRP:GECgSOdC9uZ/qZKSd8CmGP

Malware Config

Targets

    • Target

      847277818be6f8db7ab5eacbc92a3d2c

    • Size

      144KB

    • MD5

      847277818be6f8db7ab5eacbc92a3d2c

    • SHA1

      7ba5c5dff0dab39a75c2021e54a015cd9b978ec1

    • SHA256

      29a76ebacc5b1771013dfa32a9c2f7c619db969389fb54bc938e7cce29cde026

    • SHA512

      7fa42a545262035eb5f7219e0b15d4105e63c83e4137928c1dfc63c868665289782ea9e84d0835a1f5ecd4652a633e93df9fbee821849eac3654d664bfc7aeec

    • SSDEEP

      3072:/uE51ig/x0HudC9iFYS/qwoKSErBMlAzXXiZUrYRP:GECgSOdC9uZ/qZKSd8CmGP

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks