General

  • Target

    hel.txt

  • Size

    890B

  • Sample

    241110-rqnw2syclm

  • MD5

    94c2e0523a20c9583fdb3883fe6f494e

  • SHA1

    4aeb3a7075f7ca9b71f34eca1c3ffdbba9b41c40

  • SHA256

    dcd9462812ba185cf250b29936715542111862db0dac6f2b8ac3ab12e0afa9f1

  • SHA512

    159721547483b688c4a19038df0acacfd9e77146b1ab8a1a2d3713c260a6247ff0a11d7f0b66e62692e4a8ccddf4db82b912c8a03526eb6eea6335b87fdab0e0

Malware Config

Targets

    • Target

      hel.txt

    • Size

      890B

    • MD5

      94c2e0523a20c9583fdb3883fe6f494e

    • SHA1

      4aeb3a7075f7ca9b71f34eca1c3ffdbba9b41c40

    • SHA256

      dcd9462812ba185cf250b29936715542111862db0dac6f2b8ac3ab12e0afa9f1

    • SHA512

      159721547483b688c4a19038df0acacfd9e77146b1ab8a1a2d3713c260a6247ff0a11d7f0b66e62692e4a8ccddf4db82b912c8a03526eb6eea6335b87fdab0e0

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks