General

  • Target

    PAGO_USD40K.exe

  • Size

    1.6MB

  • Sample

    250403-qmwl2szj16

  • MD5

    46e57c2cfaab26093145b2e2584f7757

  • SHA1

    6d73d4b32254af73ce807d0ba106d72fd422a707

  • SHA256

    b59b16c544f5dd935b6c2b83402624705bdd0517ac04ecedaa6f6abfede8ed9b

  • SHA512

    f4cfd19490b981a5f96fc38bc29e6e0cc6564d48f01b8a55b66c60ca3500369bbb72c4c00031ace1b00620b6eb5104ae11bcb693f7106f46af8040891af668f4

  • SSDEEP

    24576:Mo5TVXh8s0pOryoJ9uC1lQ8HbbRMozz65B4zSNKL52yePwzj:L5/8cyFmbbReB4WN3Uj

Malware Config

Targets

    • Target

      PAGO_USD40K.exe

    • Size

      1.6MB

    • MD5

      46e57c2cfaab26093145b2e2584f7757

    • SHA1

      6d73d4b32254af73ce807d0ba106d72fd422a707

    • SHA256

      b59b16c544f5dd935b6c2b83402624705bdd0517ac04ecedaa6f6abfede8ed9b

    • SHA512

      f4cfd19490b981a5f96fc38bc29e6e0cc6564d48f01b8a55b66c60ca3500369bbb72c4c00031ace1b00620b6eb5104ae11bcb693f7106f46af8040891af668f4

    • SSDEEP

      24576:Mo5TVXh8s0pOryoJ9uC1lQ8HbbRMozz65B4zSNKL52yePwzj:L5/8cyFmbbReB4WN3Uj

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader Second Stage

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks