General

  • Target

    947d1c793b0e89ccb0e9cba3a7e2ab861f8e008395a61dfabfea528cbd4390c9.exe

  • Size

    408KB

  • Sample

    250108-z7g4tswpal

  • MD5

    eec30eff63ddd1310a0e0e5e69091a70

  • SHA1

    cc0b9ec3453bf114da252787fc8f597ae7e7c9c4

  • SHA256

    947d1c793b0e89ccb0e9cba3a7e2ab861f8e008395a61dfabfea528cbd4390c9

  • SHA512

    a7600c6f35a18f343263b2fa1c021c4b2d9e45a914b45a6a83a0f79ee36b89e72d44aa860567a05f311b9153feaa431211b99d18dee31d34e1b838710a6ab69f

  • SSDEEP

    6144:nrgVRqxrKPWlQ4RBtpdhx3W7BU7JadODbTI3ue:nMVirw4fHxWa7odODbTaue

Malware Config

Targets

    • Target

      947d1c793b0e89ccb0e9cba3a7e2ab861f8e008395a61dfabfea528cbd4390c9.exe

    • Size

      408KB

    • MD5

      eec30eff63ddd1310a0e0e5e69091a70

    • SHA1

      cc0b9ec3453bf114da252787fc8f597ae7e7c9c4

    • SHA256

      947d1c793b0e89ccb0e9cba3a7e2ab861f8e008395a61dfabfea528cbd4390c9

    • SHA512

      a7600c6f35a18f343263b2fa1c021c4b2d9e45a914b45a6a83a0f79ee36b89e72d44aa860567a05f311b9153feaa431211b99d18dee31d34e1b838710a6ab69f

    • SSDEEP

      6144:nrgVRqxrKPWlQ4RBtpdhx3W7BU7JadODbTI3ue:nMVirw4fHxWa7odODbTaue

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Looks for VirtualBox Guest Additions in registry

    • ModiLoader Second Stage

    • Adds policy Run key to start application

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Deletes itself

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks