General
-
Target
0d24a03ffaf0eb8d6fa4c2f6b19b00a1330cc79e9126b333c0602a053e02a28e.exe
-
Size
992KB
-
Sample
241127-cjqpqs1mhz
-
MD5
488ab7717e5e101d15ed68323b150907
-
SHA1
c1a33ce7d9203f527d47440d4c4906b72aa37b8e
-
SHA256
0d24a03ffaf0eb8d6fa4c2f6b19b00a1330cc79e9126b333c0602a053e02a28e
-
SHA512
605c22967d70b7b0dc2f15eacff8f2fdcf670ab8713ff8b25b15024ac290cb8739611bc737e4b4d046672da95b8b54b8f94979e0abca1f48d39e02f6c9d326e6
-
SSDEEP
24576:jUxqmAaQcNYgMA3iYcx3RqrPBzKRfuHpEqiyu5TOj:jUSBYc3qrWyusj
Static task
static1
Behavioral task
behavioral1
Sample
0d24a03ffaf0eb8d6fa4c2f6b19b00a1330cc79e9126b333c0602a053e02a28e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d24a03ffaf0eb8d6fa4c2f6b19b00a1330cc79e9126b333c0602a053e02a28e.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
0d24a03ffaf0eb8d6fa4c2f6b19b00a1330cc79e9126b333c0602a053e02a28e.exe
-
Size
992KB
-
MD5
488ab7717e5e101d15ed68323b150907
-
SHA1
c1a33ce7d9203f527d47440d4c4906b72aa37b8e
-
SHA256
0d24a03ffaf0eb8d6fa4c2f6b19b00a1330cc79e9126b333c0602a053e02a28e
-
SHA512
605c22967d70b7b0dc2f15eacff8f2fdcf670ab8713ff8b25b15024ac290cb8739611bc737e4b4d046672da95b8b54b8f94979e0abca1f48d39e02f6c9d326e6
-
SSDEEP
24576:jUxqmAaQcNYgMA3iYcx3RqrPBzKRfuHpEqiyu5TOj:jUSBYc3qrWyusj
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-