General

  • Target

    609466fcae46344a419e4811e83b5299e2b94107bc1956bf71713764a153b1c0.exe

  • Size

    1.3MB

  • Sample

    250124-fdhcys1qgk

  • MD5

    f8917dd23a244af6a89a7c388bfb2d5c

  • SHA1

    6fb52c21afe5fe112e586ea69568c7e70158afa1

  • SHA256

    609466fcae46344a419e4811e83b5299e2b94107bc1956bf71713764a153b1c0

  • SHA512

    b3f7bac38474fce1ef40928b5be6884605fef86146332a474a00c8e23593cd4e3f03419b58aa84feb51a53ff7205e537bdaee51122f4887e89ceb3f228fa0b34

  • SSDEEP

    24576:JUWe1lsIh7u57Mhl0Siz+h4dYEXvVzlFjG31di:JClztlpiz+adRvVR2D

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    lwaziacademy.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    jB_PZJCJu8Xz

Targets

    • Target

      609466fcae46344a419e4811e83b5299e2b94107bc1956bf71713764a153b1c0.exe

    • Size

      1.3MB

    • MD5

      f8917dd23a244af6a89a7c388bfb2d5c

    • SHA1

      6fb52c21afe5fe112e586ea69568c7e70158afa1

    • SHA256

      609466fcae46344a419e4811e83b5299e2b94107bc1956bf71713764a153b1c0

    • SHA512

      b3f7bac38474fce1ef40928b5be6884605fef86146332a474a00c8e23593cd4e3f03419b58aa84feb51a53ff7205e537bdaee51122f4887e89ceb3f228fa0b34

    • SSDEEP

      24576:JUWe1lsIh7u57Mhl0Siz+h4dYEXvVzlFjG31di:JClztlpiz+adRvVR2D

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks