General

  • Target

    b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe

  • Size

    376KB

  • Sample

    241218-hkt2faxqcw

  • MD5

    f6c65d3d7783d6c6b21383e4ee50f6d0

  • SHA1

    28f16d6c44991249b52af17e134649bfd1911ad6

  • SHA256

    b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4f

  • SHA512

    f9b5d9b1de92039f6c06994a7ac4dfaede3abf51e085fad07f52ae227910eab21e0e1c984812800debc90dccbd08698bb7c845c434a36a4766511173cc9bfa68

  • SSDEEP

    6144:c9ctxJKFzDz8KFykipAjWnt7Q4VonPGgmFrrDciW1oreICFpz7K/obXko4:c6XKxYKBipBgBmFrrDcixeIkp6/GXko4

Malware Config

Targets

    • Target

      b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4fN.exe

    • Size

      376KB

    • MD5

      f6c65d3d7783d6c6b21383e4ee50f6d0

    • SHA1

      28f16d6c44991249b52af17e134649bfd1911ad6

    • SHA256

      b01a47c8562851b30cca233f6124d279c20b4c93ef99a64eaa9b1824ae5ccc4f

    • SHA512

      f9b5d9b1de92039f6c06994a7ac4dfaede3abf51e085fad07f52ae227910eab21e0e1c984812800debc90dccbd08698bb7c845c434a36a4766511173cc9bfa68

    • SSDEEP

      6144:c9ctxJKFzDz8KFykipAjWnt7Q4VonPGgmFrrDciW1oreICFpz7K/obXko4:c6XKxYKBipBgBmFrrDcixeIkp6/GXko4

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks