General

  • Target

    5eef0d68a5c8985cfe5f924ef9698987d76778c63e63e02c0b13869b693395c9

  • Size

    936KB

  • Sample

    250118-bl2pcaymdv

  • MD5

    c349a9f8ec51556d1f8c4091c3e201d8

  • SHA1

    f94f37e74894d1006ad4282819b030c853adebfc

  • SHA256

    5eef0d68a5c8985cfe5f924ef9698987d76778c63e63e02c0b13869b693395c9

  • SHA512

    7480e0ada342309c1cd49fe538b8398f174a2b7b3976157be27616f66988dc5f015d284380e1ae655788fbd0cbaf83acbc29b79277b2843a88f4c4139c4735d4

  • SSDEEP

    12288:NkhPjEhWdkiU8CJJ3/C4qVES7kkMzNCfaS/mawpVdAorkBK1zmQ7HDEKDmC/E:mdjRdkF8CJJ3aVxkvREvPOlIWznHY

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    techniqueqatar.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    TechFB2023$$$

Targets

    • Target

      5eef0d68a5c8985cfe5f924ef9698987d76778c63e63e02c0b13869b693395c9

    • Size

      936KB

    • MD5

      c349a9f8ec51556d1f8c4091c3e201d8

    • SHA1

      f94f37e74894d1006ad4282819b030c853adebfc

    • SHA256

      5eef0d68a5c8985cfe5f924ef9698987d76778c63e63e02c0b13869b693395c9

    • SHA512

      7480e0ada342309c1cd49fe538b8398f174a2b7b3976157be27616f66988dc5f015d284380e1ae655788fbd0cbaf83acbc29b79277b2843a88f4c4139c4735d4

    • SSDEEP

      12288:NkhPjEhWdkiU8CJJ3/C4qVES7kkMzNCfaS/mawpVdAorkBK1zmQ7HDEKDmC/E:mdjRdkF8CJJ3aVxkvREvPOlIWznHY

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks