General

  • Target

    ORDER-REQUIRMENT-REF-000042531.GZ

  • Size

    648KB

  • Sample

    250123-kz1tmstqcm

  • MD5

    faeab81dabaf1ba0b3e2501211dbd7b3

  • SHA1

    76acac994c71c758d6b6a82d4fbb577f4d06da87

  • SHA256

    51855fc6ee55b7ed3c5b7dbefbc0fa8d9efba42e3176df41dc5c87018b67803f

  • SHA512

    631cd110ffaf32bbfa86eb4b02781826f1e4786410acadad815e5f46b3790c561f00017cdda2ef62c93b879f5e955a283572e671bd5e386450b065f831b8cc5a

  • SSDEEP

    12288:OmdjF2KM86HDSBuEM99sD05xBYlYApLWWgRNthpLjGCXZgLaHFc5GkpD8HWWVeP:FdS86Tg0SuApLZgRNthRjAalIvQNq

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    lwaziacademy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    jB_PZJCJu8Xz

Targets

    • Target

      ORDER-REQUIRMENT-REF-000042531.GZ

    • Size

      648KB

    • MD5

      faeab81dabaf1ba0b3e2501211dbd7b3

    • SHA1

      76acac994c71c758d6b6a82d4fbb577f4d06da87

    • SHA256

      51855fc6ee55b7ed3c5b7dbefbc0fa8d9efba42e3176df41dc5c87018b67803f

    • SHA512

      631cd110ffaf32bbfa86eb4b02781826f1e4786410acadad815e5f46b3790c561f00017cdda2ef62c93b879f5e955a283572e671bd5e386450b065f831b8cc5a

    • SSDEEP

      12288:OmdjF2KM86HDSBuEM99sD05xBYlYApLWWgRNthpLjGCXZgLaHFc5GkpD8HWWVeP:FdS86Tg0SuApLZgRNthRjAalIvQNq

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks