General

  • Target

    10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.cmd

  • Size

    1.2MB

  • Sample

    241210-hy4ssssrdk

  • MD5

    66a85b087ff82e8bf665a8055689e514

  • SHA1

    c2b60e409d26e3aee3f5e48b6ce73865fd434ad4

  • SHA256

    18b2a588242fa4c92af05cf27f5f22c8e83b42db17c40ab4307012c685b98755

  • SHA512

    bdd11ff5a14e5ceca242d4d423c48204c73343fbe9368de5a4be112c588462c7ede0dff4d70280e4a972694753bce6989dd13968fb67b1908bd6baf7fa393fb0

  • SSDEEP

    24576:zPMPVEhH8frMNVO1wyWYVtcqqvHP7R3Eb1v7kcER8:zPUyOShq0HFA7TER8

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    webmail.thematman.com.au
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    matman22#

Targets

    • Target

      10122024_0709_PURCHASE..REQUIRED..DETAILS..000124.cmd

    • Size

      1.2MB

    • MD5

      66a85b087ff82e8bf665a8055689e514

    • SHA1

      c2b60e409d26e3aee3f5e48b6ce73865fd434ad4

    • SHA256

      18b2a588242fa4c92af05cf27f5f22c8e83b42db17c40ab4307012c685b98755

    • SHA512

      bdd11ff5a14e5ceca242d4d423c48204c73343fbe9368de5a4be112c588462c7ede0dff4d70280e4a972694753bce6989dd13968fb67b1908bd6baf7fa393fb0

    • SSDEEP

      24576:zPMPVEhH8frMNVO1wyWYVtcqqvHP7R3Eb1v7kcER8:zPUyOShq0HFA7TER8

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks