General

  • Target

    bb3ebe38b063b4cba83a5d6fcb72d78ceee854a8722a80afa5495c5e32bbf9f5

  • Size

    130KB

  • Sample

    240501-c7gfzaea81

  • MD5

    038fe18d63258d2d09922752262e8ccc

  • SHA1

    e4c3e82482e210a01c571b75f1a3c9367e30953d

  • SHA256

    bb3ebe38b063b4cba83a5d6fcb72d78ceee854a8722a80afa5495c5e32bbf9f5

  • SHA512

    bac18bd1fef74eae7f3a3ebaf615b2d44b433e74379aa276464f085ced77863713dd3d1e3b6b3b1e8839f6f3f1ec6dd3b09ca24d978c609e66bd27a3e0d8000c

  • SSDEEP

    1536:mH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmNJ:6KQJcinxphkG5Q6GdpIOkJHhKRyOXK

Malware Config

Targets

    • Target

      bb3ebe38b063b4cba83a5d6fcb72d78ceee854a8722a80afa5495c5e32bbf9f5

    • Size

      130KB

    • MD5

      038fe18d63258d2d09922752262e8ccc

    • SHA1

      e4c3e82482e210a01c571b75f1a3c9367e30953d

    • SHA256

      bb3ebe38b063b4cba83a5d6fcb72d78ceee854a8722a80afa5495c5e32bbf9f5

    • SHA512

      bac18bd1fef74eae7f3a3ebaf615b2d44b433e74379aa276464f085ced77863713dd3d1e3b6b3b1e8839f6f3f1ec6dd3b09ca24d978c609e66bd27a3e0d8000c

    • SSDEEP

      1536:mH1ZaQvR1KiX3NK6I+hZhYrt/w5Q6G6IpiRYzz9qJHhhnm0yG5aP/5UROXTmNJ:6KQJcinxphkG5Q6GdpIOkJHhKRyOXK

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Detects Windows executables referencing non-Windows User-Agents

    • ModiLoader Second Stage

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks