General

  • Target

    06e06b9755afbef8614730b63c425b2845f40de85cb710da260199dd58fe136c.exe

  • Size

    1.5MB

  • Sample

    250101-zznlmstrgy

  • MD5

    f143e66ce76861ac9af6648a9e5ca9e8

  • SHA1

    d17c0ace759d0f77f500e8b0371d41f73301cbd3

  • SHA256

    06e06b9755afbef8614730b63c425b2845f40de85cb710da260199dd58fe136c

  • SHA512

    81b257dcd878e4f1b9ce88814cfb18b31ee01352ada2ca9dad9282a6072bc621c60fdbf32c7cba571b075cf5e20b00211a37e4ecc1b6e11bb337f4f1792b9de3

  • SSDEEP

    24576:ybzkvy/WQ9JGhRg8MLr12geV421wu0L8UnE923HZshmMv6Ji:ybzgZh+HV21W8UE923HZrs6g

Malware Config

Targets

    • Target

      06e06b9755afbef8614730b63c425b2845f40de85cb710da260199dd58fe136c.exe

    • Size

      1.5MB

    • MD5

      f143e66ce76861ac9af6648a9e5ca9e8

    • SHA1

      d17c0ace759d0f77f500e8b0371d41f73301cbd3

    • SHA256

      06e06b9755afbef8614730b63c425b2845f40de85cb710da260199dd58fe136c

    • SHA512

      81b257dcd878e4f1b9ce88814cfb18b31ee01352ada2ca9dad9282a6072bc621c60fdbf32c7cba571b075cf5e20b00211a37e4ecc1b6e11bb337f4f1792b9de3

    • SSDEEP

      24576:ybzkvy/WQ9JGhRg8MLr12geV421wu0L8UnE923HZshmMv6Ji:ybzgZh+HV21W8UE923HZrs6g

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks