General

  • Target

    22d6ea142dc14e08475c61aac8555f3996ef80701474865f2ed7db42cd9e2e57

  • Size

    1.7MB

  • Sample

    240516-bwrbcseb3x

  • MD5

    ba58a19a6475eff2c5bb9b6dfc7d9dd3

  • SHA1

    407eda96d6cc766e17a6a27cf37cc63dd82537f3

  • SHA256

    22d6ea142dc14e08475c61aac8555f3996ef80701474865f2ed7db42cd9e2e57

  • SHA512

    6e53a2642c36cddc8cad22ca898c358d3393bd0a880fb5d364cb4aa38ef200b9b0b06dd03a13d05ef91e9867cb172eb2e05a021f0b28282028f8a1eaacdaf9e0

  • SSDEEP

    49152:mirGmwDGQ15rlkRH/7CG+xJZAOALfrSUv15gmm7kqQILp5ibWkT:miimqzwOALfrSUv15gmm7kqQILp5

Malware Config

Targets

    • Target

      22d6ea142dc14e08475c61aac8555f3996ef80701474865f2ed7db42cd9e2e57

    • Size

      1.7MB

    • MD5

      ba58a19a6475eff2c5bb9b6dfc7d9dd3

    • SHA1

      407eda96d6cc766e17a6a27cf37cc63dd82537f3

    • SHA256

      22d6ea142dc14e08475c61aac8555f3996ef80701474865f2ed7db42cd9e2e57

    • SHA512

      6e53a2642c36cddc8cad22ca898c358d3393bd0a880fb5d364cb4aa38ef200b9b0b06dd03a13d05ef91e9867cb172eb2e05a021f0b28282028f8a1eaacdaf9e0

    • SSDEEP

      49152:mirGmwDGQ15rlkRH/7CG+xJZAOALfrSUv15gmm7kqQILp5ibWkT:miimqzwOALfrSUv15gmm7kqQILp5

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

4
T1552

Credentials In Files

3
T1552.001

Credentials in Registry

1
T1552.002

Collection

Data from Local System

4
T1005

Tasks