General

  • Target

    6f4be57897f8514492feefc8be1b21de68c9c86698cd13716dc41d553faf9d0c

  • Size

    946B

  • Sample

    250116-bvkr7atrc1

  • MD5

    7f00a05fd4fea1604889e33e2fad626f

  • SHA1

    aca83ab35b686df6b946b301e9ecd07404f48a36

  • SHA256

    6f4be57897f8514492feefc8be1b21de68c9c86698cd13716dc41d553faf9d0c

  • SHA512

    af129361e52aef24cce12f0d75a5cd684366863f5d02ce27bd2acf8e2759346b59ebb11e94ad8be965aa47f21601911366409ada3518fd00a1299d183dc6c1c2

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    techniqueqatar.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TechFB2023$$$

Targets

    • Target

      WB-ABS-240730-NEW.lnk

    • Size

      2KB

    • MD5

      fb1f82957abd04d7fc7821770bcc0ace

    • SHA1

      f1791fbc7da30766c1938336275447b791763c83

    • SHA256

      7dc2e910ac868412c616ef80d20c76e059c1962b023ca51d8c319185aa0bcbcb

    • SHA512

      a1550140664e9a99f4af64a1786c35d36d6ed8f4399391d6616bd7a00f070393982c668a18b2064c88aeee42f9aaf0f56460a79d1c05f00105e22317823a0820

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks