General

  • Target

    19012025_1019_x.exe

  • Size

    973KB

  • Sample

    250119-mc1lgatlb1

  • MD5

    72d63924b474c076c3f54e556dcd3f8b

  • SHA1

    bf448f7c1d3a8906b6c697d2f2dadf58e56f7bbf

  • SHA256

    d78342ca78b975e822d380ccf2d2e8ec9dc910f91eefdeb049f28e7c97598c68

  • SHA512

    b846ade542938e2b70375620c3d2b8e8c28b1232cbf3d11c62ba21109a2d1b1733b5951ba57f1369532bc5fd75cc7466eb8552bf8d439c39418048446aebba55

  • SSDEEP

    24576:bBVRVxmQEkZkjSnbyewh+lMewKe9X7yxw7IYNoIjSst8H2se:bBmB+Q+SJwxw7IYNbjSi8H2se

Malware Config

Targets

    • Target

      19012025_1019_x.exe

    • Size

      973KB

    • MD5

      72d63924b474c076c3f54e556dcd3f8b

    • SHA1

      bf448f7c1d3a8906b6c697d2f2dadf58e56f7bbf

    • SHA256

      d78342ca78b975e822d380ccf2d2e8ec9dc910f91eefdeb049f28e7c97598c68

    • SHA512

      b846ade542938e2b70375620c3d2b8e8c28b1232cbf3d11c62ba21109a2d1b1733b5951ba57f1369532bc5fd75cc7466eb8552bf8d439c39418048446aebba55

    • SSDEEP

      24576:bBVRVxmQEkZkjSnbyewh+lMewKe9X7yxw7IYNoIjSst8H2se:bBmB+Q+SJwxw7IYNbjSi8H2se

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks