General
-
Target
815329af40c012e99c3adba70ebff5014fbde645b8e433344f51966d34580283.exe
-
Size
1.4MB
-
Sample
240501-b33b7sda4x
-
MD5
d2526483ef4129e63bbf80025b8e10ec
-
SHA1
4c71c524cd7176b858db856e63fc39ab043595e7
-
SHA256
815329af40c012e99c3adba70ebff5014fbde645b8e433344f51966d34580283
-
SHA512
15c8913ecf7f234b0ad598f67d4073199635dba4e701fb4c6394e6919597977c931e2040129defd4c2132b4a927d1061714f16c11fdcde3fd3d49d8f301b65d0
-
SSDEEP
24576:jrVwDIOjBTiCcv9WeAvHUFQkHNJxrx0uHctgGqM0FvjAirjlUIxB:j3dzA/CQk/d9ct0MEvjvj
Static task
static1
Behavioral task
behavioral1
Sample
815329af40c012e99c3adba70ebff5014fbde645b8e433344f51966d34580283.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
815329af40c012e99c3adba70ebff5014fbde645b8e433344f51966d34580283.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.pcclimited.org - Port:
587 - Username:
[email protected] - Password:
tgbyhn@info
Targets
-
-
Target
815329af40c012e99c3adba70ebff5014fbde645b8e433344f51966d34580283.exe
-
Size
1.4MB
-
MD5
d2526483ef4129e63bbf80025b8e10ec
-
SHA1
4c71c524cd7176b858db856e63fc39ab043595e7
-
SHA256
815329af40c012e99c3adba70ebff5014fbde645b8e433344f51966d34580283
-
SHA512
15c8913ecf7f234b0ad598f67d4073199635dba4e701fb4c6394e6919597977c931e2040129defd4c2132b4a927d1061714f16c11fdcde3fd3d49d8f301b65d0
-
SSDEEP
24576:jrVwDIOjBTiCcv9WeAvHUFQkHNJxrx0uHctgGqM0FvjAirjlUIxB:j3dzA/CQk/d9ct0MEvjvj
-
Detect ZGRat V1
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Detect packed .NET executables. Mostly AgentTeslaV4.
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1