General
-
Target
0794732-20240502-000023.Tar
-
Size
577KB
-
Sample
240506-lqmq4abb47
-
MD5
d6c6086f87d3cff1c09b98caec6c2d4e
-
SHA1
f202309d61bf9616e721a4d8cb739368e33b18bc
-
SHA256
c64ea8c7bd49b10ea6d10d5bb3da80ff8540b6e2c3eb48174533b3ebe00a5e0e
-
SHA512
934aed82bb119e78d4b90ba9ef3e79ee21a800dfca96d221b79b5246036fd81174f905993dfe272a4168675d55e23e0da0ef7ddc65a33d2c946b006c90e7fa06
-
SSDEEP
12288:yKQfIc/WRK6luorYnFR3z+hzeUP4+9Ph6XY6GtcLEXYPm7mYb:yKQfI1fbzJ4gPUXHE8mKY
Static task
static1
Behavioral task
behavioral1
Sample
0794732-20240502-000023.cmd
Resource
win7-20240221-en
Malware Config
Extracted
Protocol: smtp- Host:
sslout.de - Port:
587 - Username:
[email protected] - Password:
dataset123
Targets
-
-
Target
0794732-20240502-000023.cmd
-
Size
2.5MB
-
MD5
cb7ad4fb01d8db651c816dee2ae10f85
-
SHA1
fc9b1ccb0acec60b8657e80dc664448cc6c508e7
-
SHA256
b81cd60b3bf0374b465e0b3b088a13eef95fa61e6acc1226d1b7f68bbef602da
-
SHA512
d51d12007fb51043e0f103067e778d98706e9c96a0134c722351b8dde4d720677857181dec419ffb063e64be60c9fc4fbc2a9e8313898f807ab0a9ef70cb0823
-
SSDEEP
49152:RM/SqG8iJ+4e2Dhq3ebaDZwZBhJRuf5yt:B
-
Detect ZGRat V1
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-