General

  • Target

    Ziraat_Bankasi_Swift_Mesaji_TXB04958T.chm

  • Size

    75KB

  • Sample

    250123-s16qaatqgz

  • MD5

    8e024bab46d1fb2db38dd990521b953a

  • SHA1

    e4884caf5bf755dffcbcc479e8e38dbe693c6de7

  • SHA256

    e7fce30b5e5b5f550b4d1e773645530c94efee53821502c6253cadd7a7037cb5

  • SHA512

    798da85936f4431dbbde9267f57e2ad2ec437d925e6cec9bfc6a708c7e6395af48be0078cf9b76d38fc47f316b115814718b49d4d28ed7eecbd54b707736f34a

  • SSDEEP

    1536:dPgSDXMd7ehSISBV2FsXme6bARtAPhXUO5v:RgmXMd726VLmeVRKt5v

Malware Config

Targets

    • Target

      Ziraat_Bankasi_Swift_Mesaji_TXB04958T.chm

    • Size

      75KB

    • MD5

      8e024bab46d1fb2db38dd990521b953a

    • SHA1

      e4884caf5bf755dffcbcc479e8e38dbe693c6de7

    • SHA256

      e7fce30b5e5b5f550b4d1e773645530c94efee53821502c6253cadd7a7037cb5

    • SHA512

      798da85936f4431dbbde9267f57e2ad2ec437d925e6cec9bfc6a708c7e6395af48be0078cf9b76d38fc47f316b115814718b49d4d28ed7eecbd54b707736f34a

    • SSDEEP

      1536:dPgSDXMd7ehSISBV2FsXme6bARtAPhXUO5v:RgmXMd726VLmeVRKt5v

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks