Malware Analysis Report

2025-06-16 05:49

Sample ID 240325-wkllyshe5v
Target de9db329b22c52090c30f9807e2b4eb9
SHA256 6aec49c1be6e7920c03008bd324f832d46b8f51c17b4322cd8e76bef9a222c0f
Tags
modiloader trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6aec49c1be6e7920c03008bd324f832d46b8f51c17b4322cd8e76bef9a222c0f

Threat Level: Known bad

The file de9db329b22c52090c30f9807e2b4eb9 was found to be: Known bad.

Malicious Activity Summary

modiloader trojan

ModiLoader Second Stage

Modiloader family

ModiLoader, DBatLoader

ModiLoader Second Stage

Drops file in Program Files directory

Unsigned PE

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-03-25 17:58

Signatures

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

Modiloader family

modiloader

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-25 17:58

Reported

2024-03-25 18:01

Platform

win7-20231129-en

Max time kernel

119s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe

"C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe"

C:\program files\internet explorer\IEXPLORE.EXE

"C:\program files\internet explorer\IEXPLORE.EXE"

Network

N/A

Files

memory/1368-2-0x0000000000400000-0x0000000000518000-memory.dmp

memory/1368-0-0x0000000000270000-0x0000000000271000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-03-25 17:58

Reported

2024-03-25 18:01

Platform

win10v2004-20240226-en

Max time kernel

149s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe"

Signatures

ModiLoader, DBatLoader

trojan modiloader

ModiLoader Second Stage

Description Indicator Process Target
N/A N/A N/A N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\2010.txt C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe

"C:\Users\Admin\AppData\Local\Temp\de9db329b22c52090c30f9807e2b4eb9.exe"

C:\program files\internet explorer\IEXPLORE.EXE

"C:\program files\internet explorer\IEXPLORE.EXE"

Network

Country Destination Domain Proto
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 179.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 20.231.121.79:80 tcp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 195.177.78.104.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 217.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 208.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 178.178.17.96.in-addr.arpa udp
GB 96.17.178.178:80 tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
GB 96.17.178.181:80 tcp
US 8.8.8.8:53 192.230.140.95.in-addr.arpa udp
GB 96.17.178.181:80 tcp
US 8.8.8.8:53 181.178.17.96.in-addr.arpa udp
GB 96.17.178.181:80 tcp
US 8.8.8.8:53 udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
PL 93.184.221.240:80 tcp
PL 93.184.221.240:80 tcp
US 8.8.8.8:53 63.141.182.52.in-addr.arpa udp

Files

memory/4412-1-0x00000000022D0000-0x00000000022D1000-memory.dmp

memory/4412-2-0x0000000000400000-0x0000000000518000-memory.dmp