General

  • Target

    INQUIRY LIST 292.vbs

  • Size

    1.1MB

  • Sample

    250116-mdpklawrhq

  • MD5

    2f5edacbfdae7a51267deeb8e937bfec

  • SHA1

    d0ce895b7a4e55fe7f12121878a5818850f1dc00

  • SHA256

    07898f8cb7e07bd6b86fd09cfff5898eb246a44524b3dda7a39e3de32667490b

  • SHA512

    fb8c8d268dd5f4b0c619213a0c36c3132574d04c8780eb4c5623af08c7aea7d12fdc1dcab4903908b099b2874a34f8d9804af746978a93af488a95a101d0d392

  • SSDEEP

    24576:uR3Gv4DQo4o3Hj6R3EpqvdG5Np4kJL7a5ZKCmjLpvi:HBo4o3kE4w2kw5w4

Malware Config

Targets

    • Target

      INQUIRY LIST 292.vbs

    • Size

      1.1MB

    • MD5

      2f5edacbfdae7a51267deeb8e937bfec

    • SHA1

      d0ce895b7a4e55fe7f12121878a5818850f1dc00

    • SHA256

      07898f8cb7e07bd6b86fd09cfff5898eb246a44524b3dda7a39e3de32667490b

    • SHA512

      fb8c8d268dd5f4b0c619213a0c36c3132574d04c8780eb4c5623af08c7aea7d12fdc1dcab4903908b099b2874a34f8d9804af746978a93af488a95a101d0d392

    • SSDEEP

      24576:uR3Gv4DQo4o3Hj6R3EpqvdG5Np4kJL7a5ZKCmjLpvi:HBo4o3kE4w2kw5w4

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Disables RegEdit via registry modification

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks