General

  • Target

    c3d64119e96bc332f7b7621c671bd7e55ecb51ed14485cc1fc82aae3d2f2d1c9N.exe

  • Size

    200KB

  • Sample

    241216-bth7zaylfq

  • MD5

    fc17951cc7b980c86786f4489a730410

  • SHA1

    3dbc898ed0af9f1afa09545fb3ee248b38c2c171

  • SHA256

    c3d64119e96bc332f7b7621c671bd7e55ecb51ed14485cc1fc82aae3d2f2d1c9

  • SHA512

    3b5ac67dd4d4c80e923cbe0425607b79f9d43b0810f2ae47cb52754a5e67be3ddc472c8c703c40045a063a62fee2c93dc1239addd05e779d1f8c1a8d450a5d7e

  • SSDEEP

    3072:QOWekqGV2BvU7vnUbYOmbG/qH0fzRgsbl1Bi0iMLczkvsfQwUqP7GOqENSqiMkGx:nkqk2GLh/UCSlamAo4P7XqE0/4sY

Malware Config

Targets

    • Target

      c3d64119e96bc332f7b7621c671bd7e55ecb51ed14485cc1fc82aae3d2f2d1c9N.exe

    • Size

      200KB

    • MD5

      fc17951cc7b980c86786f4489a730410

    • SHA1

      3dbc898ed0af9f1afa09545fb3ee248b38c2c171

    • SHA256

      c3d64119e96bc332f7b7621c671bd7e55ecb51ed14485cc1fc82aae3d2f2d1c9

    • SHA512

      3b5ac67dd4d4c80e923cbe0425607b79f9d43b0810f2ae47cb52754a5e67be3ddc472c8c703c40045a063a62fee2c93dc1239addd05e779d1f8c1a8d450a5d7e

    • SSDEEP

      3072:QOWekqGV2BvU7vnUbYOmbG/qH0fzRgsbl1Bi0iMLczkvsfQwUqP7GOqENSqiMkGx:nkqk2GLh/UCSlamAo4P7XqE0/4sY

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • UAC bypass

    • ModiLoader Second Stage

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks