General

  • Target

    PO_0908-0989989_RoyalInternationalConstructionL.L.C.cmd

  • Size

    4.4MB

  • Sample

    250402-hvnbmswks8

  • MD5

    4ccd9114110e590192b6ac291a44aa04

  • SHA1

    82a21588f918e98c1624a80cc45a75984a1cdebc

  • SHA256

    4d0f4d4b0c4be9677d69985483ef77988e997c47457b26a16609fcc89bad5242

  • SHA512

    e0727284c96501044d1d881a03d6e58f0e020656e444a630e9edeef6e68934c243564d48394578a7ff89354771078245d5f3a22f4bdfa1b9e941fe27fad9ab36

  • SSDEEP

    49152:JOZm8FVOULlD5339WohAl04mmVC5zVdcwn/eBoKzBHNsARFiB:E

Malware Config

Targets

    • Target

      PO_0908-0989989_RoyalInternationalConstructionL.L.C.cmd

    • Size

      4.4MB

    • MD5

      4ccd9114110e590192b6ac291a44aa04

    • SHA1

      82a21588f918e98c1624a80cc45a75984a1cdebc

    • SHA256

      4d0f4d4b0c4be9677d69985483ef77988e997c47457b26a16609fcc89bad5242

    • SHA512

      e0727284c96501044d1d881a03d6e58f0e020656e444a630e9edeef6e68934c243564d48394578a7ff89354771078245d5f3a22f4bdfa1b9e941fe27fad9ab36

    • SSDEEP

      49152:JOZm8FVOULlD5339WohAl04mmVC5zVdcwn/eBoKzBHNsARFiB:E

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Accesses Microsoft Outlook accounts

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks