General

  • Target

    Dextron Group PO.exe

  • Size

    1.4MB

  • Sample

    240523-w1gmyabg38

  • MD5

    02534060c07286b6c06db8b181509fb9

  • SHA1

    eed82ba0c6cc7cc4d7c8a61844e0e84d440ebe03

  • SHA256

    012e5ef35e2f13676d6141ea12f8ad4659d8fbdea99c244c995d46e78e5b2d17

  • SHA512

    1ebea9a686adb6835c8778fd8a477c2ede69830ff24c5f8cb5d803ea7ed65174624afafb0a7e0b66c9d6ec0a0c4605d2ff17de565822ab4bc8e513d0cc878844

  • SSDEEP

    24576:yn25nPkW3amy8sQxeWcktTjbJ42auDyEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKr:yn2kGy7wTjbX/DyEEEEEEEEEEEEEEEEm

Malware Config

Targets

    • Target

      Dextron Group PO.exe

    • Size

      1.4MB

    • MD5

      02534060c07286b6c06db8b181509fb9

    • SHA1

      eed82ba0c6cc7cc4d7c8a61844e0e84d440ebe03

    • SHA256

      012e5ef35e2f13676d6141ea12f8ad4659d8fbdea99c244c995d46e78e5b2d17

    • SHA512

      1ebea9a686adb6835c8778fd8a477c2ede69830ff24c5f8cb5d803ea7ed65174624afafb0a7e0b66c9d6ec0a0c4605d2ff17de565822ab4bc8e513d0cc878844

    • SSDEEP

      24576:yn25nPkW3amy8sQxeWcktTjbJ42auDyEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKr:yn2kGy7wTjbX/DyEEEEEEEEEEEEEEEEm

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks