General

  • Target

    2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e.exe

  • Size

    1.2MB

  • Sample

    241106-raz95s1erc

  • MD5

    5ba84853152c4710fb0434d495ab2570

  • SHA1

    4b9dbafa9417b045a253ced5ccd97a93c165c54e

  • SHA256

    2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e

  • SHA512

    cf9dd4ac230eb22e0e3a89aa59d3996bb818c0b61ad6ac35b5e99207838fc76839350a4b8bc0629ce0c147e5e2e1d43ba60d972cc402a6191f2670855be0d626

  • SSDEEP

    24576:0Wi5e+pqtZeWUH33evpiAqSSTelmV1e57DKfm/CAosS9kZ:B8AQOvpF9Q1IDKfaCAoswkZ

Malware Config

Targets

    • Target

      2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e.exe

    • Size

      1.2MB

    • MD5

      5ba84853152c4710fb0434d495ab2570

    • SHA1

      4b9dbafa9417b045a253ced5ccd97a93c165c54e

    • SHA256

      2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e

    • SHA512

      cf9dd4ac230eb22e0e3a89aa59d3996bb818c0b61ad6ac35b5e99207838fc76839350a4b8bc0629ce0c147e5e2e1d43ba60d972cc402a6191f2670855be0d626

    • SSDEEP

      24576:0Wi5e+pqtZeWUH33evpiAqSSTelmV1e57DKfm/CAosS9kZ:B8AQOvpF9Q1IDKfaCAoswkZ

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks