General

  • Target

    sample

  • Size

    229KB

  • Sample

    250403-wbahbs1tas

  • MD5

    e2b3c65fefead4ef1f0be8a62a32d2ba

  • SHA1

    81ab114b694f57552420b9c3cfa9217821fa0ca8

  • SHA256

    4edfd47d97468c11039e68aa18928517e36a9537ab235535a71db2c990644467

  • SHA512

    73bcb0d782394bb235bf28e3a4fe3f6f4ab30b039013b11e94170ee8f2ce4348a4e9bb4647541fc12c0d4261c9faed87d9afe87db0a968c91a917365c97527f0

  • SSDEEP

    3072:+lqXHZY4ItZEmtlxpRG465QbI+AwtN+6u/jjP:oqXHZ3ItZ/pnIljP

Malware Config

Targets

    • Target

      sample

    • Size

      229KB

    • MD5

      e2b3c65fefead4ef1f0be8a62a32d2ba

    • SHA1

      81ab114b694f57552420b9c3cfa9217821fa0ca8

    • SHA256

      4edfd47d97468c11039e68aa18928517e36a9537ab235535a71db2c990644467

    • SHA512

      73bcb0d782394bb235bf28e3a4fe3f6f4ab30b039013b11e94170ee8f2ce4348a4e9bb4647541fc12c0d4261c9faed87d9afe87db0a968c91a917365c97527f0

    • SSDEEP

      3072:+lqXHZY4ItZEmtlxpRG465QbI+AwtN+6u/jjP:oqXHZ3ItZ/pnIljP

    • BadRabbit

      Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.

    • Badrabbit family

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modiloader family

    • ModiLoader First Stage

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks