General

  • Target

    OIP (1).jfif

  • Size

    6KB

  • Sample

    240812-h2h1havdrc

  • MD5

    f584883d2cd46340017138590a4b4ee2

  • SHA1

    e102f004ebe62f32a8056f0d3aeba157a0729684

  • SHA256

    4da31bef923881bce96e3dafe3c0cbc43a8cdf6210c7ed24ab926118580edb1e

  • SHA512

    21eac0517a5212ac14f22768c8d28ddf563c47676d6550a17c3045898d1a2d3ff4ce98d91762ef3a3c39d6f50cff4b19d05627982567a911ec9312f6900e2050

  • SSDEEP

    192:NIFJhPOZGh5h7wli+/lQeEOsjfgsNa/m9+kVybZ:NkPOO/8li+/WeEOs8Oum9+kwbZ

Malware Config

Extracted

Family

modiloader

C2

https://drive.google.com/u/0/uc?id=1TcSctGVBajYMA7CFDc158wpvqkpxmkhJ&export=download

Targets

    • Target

      OIP (1).jfif

    • Size

      6KB

    • MD5

      f584883d2cd46340017138590a4b4ee2

    • SHA1

      e102f004ebe62f32a8056f0d3aeba157a0729684

    • SHA256

      4da31bef923881bce96e3dafe3c0cbc43a8cdf6210c7ed24ab926118580edb1e

    • SHA512

      21eac0517a5212ac14f22768c8d28ddf563c47676d6550a17c3045898d1a2d3ff4ce98d91762ef3a3c39d6f50cff4b19d05627982567a911ec9312f6900e2050

    • SSDEEP

      192:NIFJhPOZGh5h7wli+/lQeEOsjfgsNa/m9+kVybZ:NkPOO/8li+/WeEOs8Oum9+kwbZ

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • ModiLoader First Stage

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Abuse Elevation Control Mechanism: Bypass User Account Control

      UAC Bypass Attempt via SilentCleanup Task.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks