General

  • Target

    23102024_1406_Paid invoice.cmd.zip

  • Size

    1.5MB

  • Sample

    241023-reqaqstfjf

  • MD5

    a39c5e5ca8633b5c7cf486a3b9f79a7c

  • SHA1

    41b80f1d1cefb9a0cc5d43609e8677d228226c92

  • SHA256

    ee5dd15af86c986f29a20709faf263065a005512c0281d3769d89d02158421f5

  • SHA512

    bc990f51ba3b74ae55727a1eae362fe2ac97df56a131e714cefa48822d7c01fb352218fa907e9619def49b6e45838d138e131501a4281357506a64e7c46f70e7

  • SSDEEP

    24576:HxUGhCD9L6YrNRL2U7o8zlBy+c6QfRzkiLalKXiBe22g1tWq0UhtODmz0LcPsKp5:HOICDVVrNRLZo83k6Qf1BakSBZlntODc

Malware Config

Targets

    • Target

      Paid invoice.cmd

    • Size

      5.2MB

    • MD5

      73545bdba7c3386f0ea604dd3ab69765

    • SHA1

      12f3c0dff67e757519b75a506fad8ae52299d9a6

    • SHA256

      18a7fccc4558d6ae5543abcf40c12698f413acc5a9369b1e08540873c0403f12

    • SHA512

      0a74e70dcc09641b0e140ab433910582297466539cbe6d114ba772459f7694c9e51a256e699f644588a60df64b78f6a9c60055a902b3b1e51010f17b31e50b7c

    • SSDEEP

      49152:Lk9AW3aaP88fGYZDv9IRS4GCRoOXKA+z5X6WE64PuXdDzuZMxxPKp4YkmFhVPSV2:b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks