Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-01-2025 23:34

General

  • Target

    Vk brute by Andrey/VK Brut by_andrey52rus.exe

  • Size

    397KB

  • MD5

    630eae021be391e129bede18e712a5a2

  • SHA1

    a66ad530108f488c9b107f9b4403e5020a2f6b78

  • SHA256

    71b2f811ab97c4258ba730fa19a79851ed90cbddb401162759d77f4186f7132d

  • SHA512

    f07c9ec90b4a3f0a4be62e0fbb0baeb177d861bf4787cf07b10a0d7f3d0aac06624154217bacc2c5001778bf41caec02c6df5e6aac4417302c41e3f39654b39d

  • SSDEEP

    6144:8Ly84u9nSO2GjZkD10BIY3rb1YfBdfpoZ3u/Ht52w6JSeiFPXcx+:o+u9nx2GjMY3XKfd/H/9PM+

Malware Config

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modiloader family
  • ModiLoader Second Stage 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vk brute by Andrey\VK Brut by_andrey52rus.exe
    "C:\Users\Admin\AppData\Local\Temp\Vk brute by Andrey\VK Brut by_andrey52rus.exe"
    1⤵
    • Impair Defenses: Safe Mode Boot
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:3068
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
      PID:3036

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3068-0-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/3068-2-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/3068-1-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB

    • memory/3068-7-0x0000000000400000-0x000000000046A000-memory.dmp

      Filesize

      424KB