General
-
Target
sample
-
Size
229KB
-
Sample
250403-wbahbs1tas
-
MD5
e2b3c65fefead4ef1f0be8a62a32d2ba
-
SHA1
81ab114b694f57552420b9c3cfa9217821fa0ca8
-
SHA256
4edfd47d97468c11039e68aa18928517e36a9537ab235535a71db2c990644467
-
SHA512
73bcb0d782394bb235bf28e3a4fe3f6f4ab30b039013b11e94170ee8f2ce4348a4e9bb4647541fc12c0d4261c9faed87d9afe87db0a968c91a917365c97527f0
-
SSDEEP
3072:+lqXHZY4ItZEmtlxpRG465QbI+AwtN+6u/jjP:oqXHZ3ItZ/pnIljP
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10ltsc2021-20250314-en
Malware Config
Targets
-
-
Target
sample
-
Size
229KB
-
MD5
e2b3c65fefead4ef1f0be8a62a32d2ba
-
SHA1
81ab114b694f57552420b9c3cfa9217821fa0ca8
-
SHA256
4edfd47d97468c11039e68aa18928517e36a9537ab235535a71db2c990644467
-
SHA512
73bcb0d782394bb235bf28e3a4fe3f6f4ab30b039013b11e94170ee8f2ce4348a4e9bb4647541fc12c0d4261c9faed87d9afe87db0a968c91a917365c97527f0
-
SSDEEP
3072:+lqXHZY4ItZEmtlxpRG465QbI+AwtN+6u/jjP:oqXHZ3ItZ/pnIljP
-
BadRabbit
Ransomware family discovered in late 2017, mainly targeting Russia and Ukraine.
-
Badrabbit family
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader First Stage
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1