General

  • Target

    be07a239e37dc5f955700812185532b1b9c52abe6a460fedaa6b3c442cb647ea

  • Size

    90KB

  • Sample

    240615-b1kz5svbla

  • MD5

    8c51cc70d8d584a179c1f1029674581e

  • SHA1

    b090b7bb21a09fbffe1e8369d3a921e7a5179ce3

  • SHA256

    be07a239e37dc5f955700812185532b1b9c52abe6a460fedaa6b3c442cb647ea

  • SHA512

    a9b846bfabde70e07e4cb34a97d8509b8392a21d40a10fc470686cf1cbee5e1cd240010ab7e60ba9b08d72c864a6aa1a0504cfdb3d5e5947fc0b3b8575dc6963

  • SSDEEP

    1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDK:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y

Malware Config

Targets

    • Target

      be07a239e37dc5f955700812185532b1b9c52abe6a460fedaa6b3c442cb647ea

    • Size

      90KB

    • MD5

      8c51cc70d8d584a179c1f1029674581e

    • SHA1

      b090b7bb21a09fbffe1e8369d3a921e7a5179ce3

    • SHA256

      be07a239e37dc5f955700812185532b1b9c52abe6a460fedaa6b3c442cb647ea

    • SHA512

      a9b846bfabde70e07e4cb34a97d8509b8392a21d40a10fc470686cf1cbee5e1cd240010ab7e60ba9b08d72c864a6aa1a0504cfdb3d5e5947fc0b3b8575dc6963

    • SSDEEP

      1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDK:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Detects Windows executables referencing non-Windows User-Agents

    • ModiLoader Second Stage

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks