General
-
Target
PAGO_USD40K.exe
-
Size
1.6MB
-
Sample
250403-qmwl2szj16
-
MD5
46e57c2cfaab26093145b2e2584f7757
-
SHA1
6d73d4b32254af73ce807d0ba106d72fd422a707
-
SHA256
b59b16c544f5dd935b6c2b83402624705bdd0517ac04ecedaa6f6abfede8ed9b
-
SHA512
f4cfd19490b981a5f96fc38bc29e6e0cc6564d48f01b8a55b66c60ca3500369bbb72c4c00031ace1b00620b6eb5104ae11bcb693f7106f46af8040891af668f4
-
SSDEEP
24576:Mo5TVXh8s0pOryoJ9uC1lQ8HbbRMozz65B4zSNKL52yePwzj:L5/8cyFmbbReB4WN3Uj
Static task
static1
Behavioral task
behavioral1
Sample
PAGO_USD40K.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
PAGO_USD40K.exe
-
Size
1.6MB
-
MD5
46e57c2cfaab26093145b2e2584f7757
-
SHA1
6d73d4b32254af73ce807d0ba106d72fd422a707
-
SHA256
b59b16c544f5dd935b6c2b83402624705bdd0517ac04ecedaa6f6abfede8ed9b
-
SHA512
f4cfd19490b981a5f96fc38bc29e6e0cc6564d48f01b8a55b66c60ca3500369bbb72c4c00031ace1b00620b6eb5104ae11bcb693f7106f46af8040891af668f4
-
SSDEEP
24576:Mo5TVXh8s0pOryoJ9uC1lQ8HbbRMozz65B4zSNKL52yePwzj:L5/8cyFmbbReB4WN3Uj
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2