General
-
Target
2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e.exe
-
Size
1.2MB
-
Sample
241106-raz95s1erc
-
MD5
5ba84853152c4710fb0434d495ab2570
-
SHA1
4b9dbafa9417b045a253ced5ccd97a93c165c54e
-
SHA256
2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e
-
SHA512
cf9dd4ac230eb22e0e3a89aa59d3996bb818c0b61ad6ac35b5e99207838fc76839350a4b8bc0629ce0c147e5e2e1d43ba60d972cc402a6191f2670855be0d626
-
SSDEEP
24576:0Wi5e+pqtZeWUH33evpiAqSSTelmV1e57DKfm/CAosS9kZ:B8AQOvpF9Q1IDKfaCAoswkZ
Static task
static1
Behavioral task
behavioral1
Sample
2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e.exe
-
Size
1.2MB
-
MD5
5ba84853152c4710fb0434d495ab2570
-
SHA1
4b9dbafa9417b045a253ced5ccd97a93c165c54e
-
SHA256
2ca6cb2f9e476a47d29af591fdf327eace4debf22785de27be7a0ea87604eb7e
-
SHA512
cf9dd4ac230eb22e0e3a89aa59d3996bb818c0b61ad6ac35b5e99207838fc76839350a4b8bc0629ce0c147e5e2e1d43ba60d972cc402a6191f2670855be0d626
-
SSDEEP
24576:0Wi5e+pqtZeWUH33evpiAqSSTelmV1e57DKfm/CAosS9kZ:B8AQOvpF9Q1IDKfaCAoswkZ
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2