General

  • Target

    d3b177e9fed03c6c52a92d60fcd7c67113589c540f1ab1bcaa860556a8c8c9f8.exe

  • Size

    912KB

  • Sample

    241127-cz4arsypeq

  • MD5

    6d3c5664e86f7246b820a67b5069daeb

  • SHA1

    ae4100b9b2e48e936037301d50007f4897fde73f

  • SHA256

    d3b177e9fed03c6c52a92d60fcd7c67113589c540f1ab1bcaa860556a8c8c9f8

  • SHA512

    2051ee37a6ff3103b6597973c705783350c5038be756ae739d936d4fef5ef17c4cac6e3b187b0f26aa232b9dba4126127e4a39254258fc706314f087fe03553c

  • SSDEEP

    24576:ETzSqlFYcq/ZgmvTZ06L5+JYmm2gackHi:ELTCvvt0g4JYNazHi

Malware Config

Targets

    • Target

      d3b177e9fed03c6c52a92d60fcd7c67113589c540f1ab1bcaa860556a8c8c9f8.exe

    • Size

      912KB

    • MD5

      6d3c5664e86f7246b820a67b5069daeb

    • SHA1

      ae4100b9b2e48e936037301d50007f4897fde73f

    • SHA256

      d3b177e9fed03c6c52a92d60fcd7c67113589c540f1ab1bcaa860556a8c8c9f8

    • SHA512

      2051ee37a6ff3103b6597973c705783350c5038be756ae739d936d4fef5ef17c4cac6e3b187b0f26aa232b9dba4126127e4a39254258fc706314f087fe03553c

    • SSDEEP

      24576:ETzSqlFYcq/ZgmvTZ06L5+JYmm2gackHi:ELTCvvt0g4JYNazHi

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks