General
-
Target
5ce8a7ef07cbd67618627078f820dae2c0f9e29a4113e498c7aefd1c39b3ad33.chm
-
Size
75KB
-
Sample
250121-dhvsqssrg1
-
MD5
98191ac03cddd697bed63b0eab761bed
-
SHA1
9ea831063cbdccf9de4b79e195800cac9d5518ad
-
SHA256
5ce8a7ef07cbd67618627078f820dae2c0f9e29a4113e498c7aefd1c39b3ad33
-
SHA512
7313ac3423e2e68e42c58a04b6b945b5b0e6ff1c8aea91fb145cca927d19b0be54b2cb174ef6a8434970b41ed539ce295da6b8246844ddbf3b5735a7b77f4a7d
-
SSDEEP
1536:pbN0IxCKVgZpisZ1MJ0cifP4R232WJniFPurASPDuP/V6McEJh:ZGIkgI1gNi44TJiFP8ASS8ML
Static task
static1
Behavioral task
behavioral1
Sample
5ce8a7ef07cbd67618627078f820dae2c0f9e29a4113e498c7aefd1c39b3ad33.chm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5ce8a7ef07cbd67618627078f820dae2c0f9e29a4113e498c7aefd1c39b3ad33.chm
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
5ce8a7ef07cbd67618627078f820dae2c0f9e29a4113e498c7aefd1c39b3ad33.chm
-
Size
75KB
-
MD5
98191ac03cddd697bed63b0eab761bed
-
SHA1
9ea831063cbdccf9de4b79e195800cac9d5518ad
-
SHA256
5ce8a7ef07cbd67618627078f820dae2c0f9e29a4113e498c7aefd1c39b3ad33
-
SHA512
7313ac3423e2e68e42c58a04b6b945b5b0e6ff1c8aea91fb145cca927d19b0be54b2cb174ef6a8434970b41ed539ce295da6b8246844ddbf3b5735a7b77f4a7d
-
SSDEEP
1536:pbN0IxCKVgZpisZ1MJ0cifP4R232WJniFPurASPDuP/V6McEJh:ZGIkgI1gNi44TJiFP8ASS8ML
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Window
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1