General

  • Target

    Dextron Group PO.7z

  • Size

    488KB

  • Sample

    240523-ay45kafa4t

  • MD5

    23cd24fc4bc37446b9f8b73ccca8f56c

  • SHA1

    87a8807ea0512b16d3d4d8c8271bb650bf60e160

  • SHA256

    bec7de366995e60d3fd9c0c3b3feb7df8018ae86df8ba96806068668e03a86f4

  • SHA512

    d7eeb6adbb7bf33e27016f4ef3c2d6e99ce1dd9903a4b8ffb85bc853d501e54795fd55e9bdd3fe26599d8c32feaf2194b5d7fa3dc9c11e0ac6243fb6fa199adf

  • SSDEEP

    12288:A9tmi4g+6JiS252lYUzUzDR2TYWXnZA76JJXNstf:A9OlqbW9OYEnZk6JJdstf

Malware Config

Targets

    • Target

      Dextron Group PO.exe

    • Size

      1.4MB

    • MD5

      02534060c07286b6c06db8b181509fb9

    • SHA1

      eed82ba0c6cc7cc4d7c8a61844e0e84d440ebe03

    • SHA256

      012e5ef35e2f13676d6141ea12f8ad4659d8fbdea99c244c995d46e78e5b2d17

    • SHA512

      1ebea9a686adb6835c8778fd8a477c2ede69830ff24c5f8cb5d803ea7ed65174624afafb0a7e0b66c9d6ec0a0c4605d2ff17de565822ab4bc8e513d0cc878844

    • SSDEEP

      24576:yn25nPkW3amy8sQxeWcktTjbJ42auDyEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKr:yn2kGy7wTjbX/DyEEEEEEEEEEEEEEEEm

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks