General
-
Target
RNSM00263.7z
-
Size
14.7MB
-
Sample
250227-abzassxxcw
-
MD5
b5605a2b8f66bf24c593e25b8f4ac814
-
SHA1
16349b6d8e7fe24a2a6c814a1b495a733f3c710a
-
SHA256
2e8e77d7d27a593727853a3ced3b73091e03240280d2c1823a112e68732d4f9a
-
SHA512
85c44d4243cc1f807712983266774177907dc34f219c3f7d55f54dede838ca8bfbce3958b1b7062ffa4d2e6770bf2fed5b0de2d25150f0d01e49a3d6c3b1a4c3
-
SSDEEP
393216:OPP2rxjRt6uTEKT3SU+jIxEKkFnAh4ET1mpEiKj5:o2rxf5PiJjIxEK2nAXA+j5
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00263.7z
Resource
win10v2004-20250217-en
Malware Config
Extracted
http://report22new.com/inst.php?id=02967
Extracted
http://reporteriche.com/inst.php?id=02967
Extracted
http://secondreporters.com/inst.php?id=spirt01
Targets
-
-
Target
RNSM00263.7z
-
Size
14.7MB
-
MD5
b5605a2b8f66bf24c593e25b8f4ac814
-
SHA1
16349b6d8e7fe24a2a6c814a1b495a733f3c710a
-
SHA256
2e8e77d7d27a593727853a3ced3b73091e03240280d2c1823a112e68732d4f9a
-
SHA512
85c44d4243cc1f807712983266774177907dc34f219c3f7d55f54dede838ca8bfbce3958b1b7062ffa4d2e6770bf2fed5b0de2d25150f0d01e49a3d6c3b1a4c3
-
SSDEEP
393216:OPP2rxjRt6uTEKT3SU+jIxEKkFnAh4ET1mpEiKj5:o2rxf5PiJjIxEK2nAXA+j5
-
Blackshades family
-
Blackshades payload
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Modiloader family
-
UAC bypass
-
Windows security bypass
-
Contacts a large (2075) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
ModiLoader Second Stage
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Windows security modification
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Safe Mode Boot
1Indicator Removal
1Clear Persistence
1Modify Registry
15Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1