General

  • Target

    e8045854aaa5789e7af6cc8655b574ec738678b9f2a98d98c242d91ed1e22606

  • Size

    90KB

  • Sample

    240616-ef8r9aydkd

  • MD5

    b5998ed5ce520568158923b2dfd222c6

  • SHA1

    8eef994abe50fbe7c5e30d62194c8af42db99a84

  • SHA256

    e8045854aaa5789e7af6cc8655b574ec738678b9f2a98d98c242d91ed1e22606

  • SHA512

    c7f958707a75e1497cde04369ebaf5ba1af1c2bad6b7ece26d0dfa3aad96bfacb645e7360e4262fe0b646e30cd70a723e4c0468a17652ab869f3aa63b0a2d16c

  • SSDEEP

    1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDK:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y

Malware Config

Targets

    • Target

      e8045854aaa5789e7af6cc8655b574ec738678b9f2a98d98c242d91ed1e22606

    • Size

      90KB

    • MD5

      b5998ed5ce520568158923b2dfd222c6

    • SHA1

      8eef994abe50fbe7c5e30d62194c8af42db99a84

    • SHA256

      e8045854aaa5789e7af6cc8655b574ec738678b9f2a98d98c242d91ed1e22606

    • SHA512

      c7f958707a75e1497cde04369ebaf5ba1af1c2bad6b7ece26d0dfa3aad96bfacb645e7360e4262fe0b646e30cd70a723e4c0468a17652ab869f3aa63b0a2d16c

    • SSDEEP

      1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDK:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Detects Windows executables referencing non-Windows User-Agents

    • ModiLoader Second Stage

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks