General

  • Target

    Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd

  • Size

    3.3MB

  • Sample

    241118-kv1yvasgrd

  • MD5

    55275e90f2a4ca23422103276e8eae71

  • SHA1

    1799345fb5bf3cf04c44bfa5b59790c9e4e8a0af

  • SHA256

    0bd7bd207364b329f44fec39787189cc5755e9fc1a714cbf3b57be785e224596

  • SHA512

    4ca26d59cba2e38751f527b12d040f1e5e67742020e3e0f93551b60f8600451e438c547d3c954778fc019889f93fb39a89ef5b214c4433a6c3f220ddabe7c26d

  • SSDEEP

    24576:IHZYL1t28pLiMl5F3p03CX4axBJGhRCB4L90l6f2tliYajE/BPbN650iKBzFufPS:I5YLHFi05X03krZUFCsILZ4AX

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    s82.gocheapweb.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    london@1759

Targets

    • Target

      Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmd

    • Size

      3.3MB

    • MD5

      55275e90f2a4ca23422103276e8eae71

    • SHA1

      1799345fb5bf3cf04c44bfa5b59790c9e4e8a0af

    • SHA256

      0bd7bd207364b329f44fec39787189cc5755e9fc1a714cbf3b57be785e224596

    • SHA512

      4ca26d59cba2e38751f527b12d040f1e5e67742020e3e0f93551b60f8600451e438c547d3c954778fc019889f93fb39a89ef5b214c4433a6c3f220ddabe7c26d

    • SSDEEP

      24576:IHZYL1t28pLiMl5F3p03CX4axBJGhRCB4L90l6f2tliYajE/BPbN650iKBzFufPS:I5YLHFi05X03krZUFCsILZ4AX

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks