General

  • Target

    5ea3b707b13ec9e17bdc954d1379f577e5b7aa78da14c7a6fd907a0b2b56c844

  • Size

    705KB

  • Sample

    241208-28dtxawjet

  • MD5

    d4d7a0da419032e44874ffce2419b4f1

  • SHA1

    f9b2dbc2c4c70fa468ad44ce491d87633d94ecba

  • SHA256

    5ea3b707b13ec9e17bdc954d1379f577e5b7aa78da14c7a6fd907a0b2b56c844

  • SHA512

    2bd488676b925e08283dc1a624994d09e377421b3cad538b05ceb26714256bde2fcecfc12a0ad44cc71a6f6d225443f235cd94489ba59e3ecd2d2a3fb381d5cb

  • SSDEEP

    12288:O66k9uL+KUnVk2W5wwyPImzQ/+afpnRyY9jjU81wePXy1b6O4q7VRTp0nVnXG:hW+NR0wwuFQZfpcYRz17XWw2rp+X

Malware Config

Targets

    • Target

      5ea3b707b13ec9e17bdc954d1379f577e5b7aa78da14c7a6fd907a0b2b56c844

    • Size

      705KB

    • MD5

      d4d7a0da419032e44874ffce2419b4f1

    • SHA1

      f9b2dbc2c4c70fa468ad44ce491d87633d94ecba

    • SHA256

      5ea3b707b13ec9e17bdc954d1379f577e5b7aa78da14c7a6fd907a0b2b56c844

    • SHA512

      2bd488676b925e08283dc1a624994d09e377421b3cad538b05ceb26714256bde2fcecfc12a0ad44cc71a6f6d225443f235cd94489ba59e3ecd2d2a3fb381d5cb

    • SSDEEP

      12288:O66k9uL+KUnVk2W5wwyPImzQ/+afpnRyY9jjU81wePXy1b6O4q7VRTp0nVnXG:hW+NR0wwuFQZfpcYRz17XWw2rp+X

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks