General

  • Target

    cfeb06f11af469362998fe7e1abd84a2c94778af9010f5654f8419dfac0698b3

  • Size

    90KB

  • Sample

    240621-ec5w7a1gkp

  • MD5

    a2d2be62c1093bd890dfeb4c490ae352

  • SHA1

    428bd0e0d5dfbc24d5f7e55a8df40e1ceb0daf9b

  • SHA256

    cfeb06f11af469362998fe7e1abd84a2c94778af9010f5654f8419dfac0698b3

  • SHA512

    5e591a63e8805d9f18236198d9dec20f57b5126cb15d0658f23f97a19659093790fe6b09bca729fbd1b0a67162e8b40921f7558104ea47550361f4c17177b8d6

  • SSDEEP

    1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDK:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y

Malware Config

Targets

    • Target

      cfeb06f11af469362998fe7e1abd84a2c94778af9010f5654f8419dfac0698b3

    • Size

      90KB

    • MD5

      a2d2be62c1093bd890dfeb4c490ae352

    • SHA1

      428bd0e0d5dfbc24d5f7e55a8df40e1ceb0daf9b

    • SHA256

      cfeb06f11af469362998fe7e1abd84a2c94778af9010f5654f8419dfac0698b3

    • SHA512

      5e591a63e8805d9f18236198d9dec20f57b5126cb15d0658f23f97a19659093790fe6b09bca729fbd1b0a67162e8b40921f7558104ea47550361f4c17177b8d6

    • SSDEEP

      1536:UiYwjQt6QJvzZsgDIWzm/xsXfv+hYhyQQyV5uv4JBrB7w5VRGulTG1ZCL8nj1oDK:0wjZQJvzZsgsW6/Afv+hYfQIm4/rdE3Y

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Detects Windows executables referencing non-Windows User-Agents

    • ModiLoader Second Stage

    • UPX dump on OEP (original entry point)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks