General
-
Target
nINV200495000-PAY ORDER0940584.tar
-
Size
729KB
-
Sample
240607-fzt9msab5v
-
MD5
64a6fdb8ce5a97dd94b677d289901220
-
SHA1
252750a9f54de1ab9a9aa3c44b52c7b8877a9b24
-
SHA256
eff779d4af4ddcc1833f1a8d877564dd7142431a48c0ac3364775a8a73802ee4
-
SHA512
a7943facc666b0eb64f1dc220cb17643a081de8f7ac551e7f9ccbcc064317b389672be50a8d2c34409933ad82cad864750372469a2b8dfd03888704cd0bca2a2
-
SSDEEP
12288:s14/X1dEbixaqA4S39v1BwWQlOn1bc6HK+qdtu6pnpnUChFScaPpZJTJwZQM6eir:s18dEbixaqZShp9nxc6Ou6pnNU1c4b3B
Static task
static1
Behavioral task
behavioral1
Sample
INV200495000-PAY ORDER0940584.cmd
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
INV200495000-PAY ORDER0940584.cmd
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
INV200495000-PAY ORDER0940584.cmd
-
Size
3.0MB
-
MD5
ba6011bbbcee0c141db0c45b8219a275
-
SHA1
e8fe383f4b6614b70fe9902618660aad3199bb62
-
SHA256
a7d331358f0530d1b5780f18ded9587256f16a675b1f440ebb73c92979d9719b
-
SHA512
3b1145ff9512fc0d7e3dcbae431cd3424e12721c17a4be043ca2b4ddd7ab4db5f9670ea07e75eedfad8d928b9fe08ca2412d062375b1df25e9ed31aa25fdfadf
-
SSDEEP
49152:MmZIVekHAYmaBfa2cLySXFDvh13zo//zhK6x3UGZJyFxCknVgGlL1+I0bHdFE4Kh:7
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-